Attacks that involve accessing or modifying your data as it travels over the network are known as __________ attacks.

a. man-in-the-middle
b. trace route
c. SSL
d. social engineering

a. man-in-the-middle

Computer Science & Information Technology

You might also like to view...

A ________ is a single media file including art, sound, animation, or movies

A) snippet B) cut C) clip D) presentation

Computer Science & Information Technology

In the mid-1980s, Microsoft developed the ________ operating system based on a graphical user interface with buttons, textboxes, menus and other graphical elements.

a) Unix b) Macintosh c) Linux d) Windows

Computer Science & Information Technology