In the ____________________ attack, an attacker monitors (or sniffs) packets from the network, modifies them, and inserts them back into the network.

A. zombie-in-the-middle
B. sniff-in-the-middle
C. server-in-the-middle
D. man-in-the-middle

Answer: D

Computer Science & Information Technology

You might also like to view...

A multi-branch if statement directs program flow through exactly one of its branches.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

____ software "zips" or reduces the size of a file using various techniques.

A. Reduction B. Compression C. Application D. Operating system

Computer Science & Information Technology