Which risk is related to interception of data in transit?

A. Virtualization
B. Man-in-the-middle
C. Software vulnerabilities
D. Traffic blocking

Answer: B. Man-in-the-middle

Computer Science & Information Technology

You might also like to view...

Access automatically saves each record when you move to the next row; you do not need to click Save

Indicate whether the statement is true or false

Computer Science & Information Technology

Which of the following IP addresses will a technician ping to test the functionality of the network card?

A. 127.0.0.0 B. 127.0.0.1 C. 127.1.1.1 D. 255.255.255.255

Computer Science & Information Technology