Which risk is related to interception of data in transit?
A. Virtualization
B. Man-in-the-middle
C. Software vulnerabilities
D. Traffic blocking
Answer: B. Man-in-the-middle
Computer Science & Information Technology
You might also like to view...
Access automatically saves each record when you move to the next row; you do not need to click Save
Indicate whether the statement is true or false
Computer Science & Information Technology
Which of the following IP addresses will a technician ping to test the functionality of the network card?
A. 127.0.0.0 B. 127.0.0.1 C. 127.1.1.1 D. 255.255.255.255
Computer Science & Information Technology