A network administrator is attempting to troubleshoot an issue regarding certificates on a secure website. During the troubleshooting process, the network administrator notices that the web gateway proxy on the local network has signed all of the certificates on the local machine.Which of the following describes the type of attack the proxy has been legitimately programmed to perform?

A. Transitive access
B. Spoofing
C. Man-in-the-middle
D. Replay

Answer: C. Man-in-the-middle

Computer Science & Information Technology

You might also like to view...

The output of printers is considered hard copy

Indicate whether the statement is true or false

Computer Science & Information Technology

The EBK specifies a detailed and commonly accepted set of required security ____________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology