In which of the following attacks is the attacker able to intercept traffic from both parties and either pass the traffic unaltered to the other end of the communication link, or the attacker can forge replies from either side?
A. DoS attack
B. brute force attack
C. man-in-the middle attack
D. IP service attack
Answer: C
Computer Science & Information Technology
You might also like to view...
A(n) ________ refers to publishing personal information on the Web
A) tweeting B) posting C) surfing D) blogging
Computer Science & Information Technology
Subscripted variables can be used anywhere that scalar variables are valid.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology