A network administrator is attempting to troubleshoot an issue regarding certificates on a secure website. During the troubleshooting process, the network administrator notices that the web gateway proxy on the local network has signed all of the certificates on the local machine.Which of the following describes the type of attack the proxy has been legitimately programmed to perform?
A. Transitive access
B. Spoofing
C. Man-in-the-middle
D. Replay
Answer: C. Man-in-the-middle
Computer Science & Information Technology
You might also like to view...
The output of printers is considered hard copy
Indicate whether the statement is true or false
Computer Science & Information Technology
The EBK specifies a detailed and commonly accepted set of required security ____________________.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology