Describe a man-in-the-middle attack.
What will be an ideal response?
A man-in-the-middle attack occurs when the attacker is able to intercept or monitor transmissions meant for a different computer. You might think of this as similar to
when someone impersonates another person. In the case of a man-in-the-middle attack, the attacker is literally operating between two communicating computers and has the opportunity to:
• Listen in on communications
• Modify communications
You might also like to view...
Which of the following is not part of an EIGRP entry in the routing table?
a. Directly connected b. D c. 90 d. via
Answer the following questions true (T) or false (F)
1. The programmer should always use a defined constant in an array declaration. 2. When using an array, it is perfectly legal to access indexed variables with index values less than 0 or greater than or equal to the declared size of the array.