In the ____________________ attack, an attacker monitors (or sniffs) packets from the network, modifies them, and inserts them back into the network.
A. zombie-in-the-middle
B. sniff-in-the-middle
C. server-in-the-middle
D. man-in-the-middle
Answer: D
You might also like to view...
Any change to graphics being displayed on the screen requires a call to the method ____________ to update the graphics.
(a) paint (b) repaint (c) update (d) all of the above
List the tasks performed by the SQA group.
What will be an ideal response?
Which of the following encrypts the body of a packet, rather than just the password, while sending information?
A. LDAP B. TACACS+ C. ACLs D. RADIUS
Which of the following commands should you use to determine whether there are any shared resources on a Windows computer with the IP address 193.145.85.202?
a. netstat -c 193.145.85.202 b. nbtscan -a 193.145.85.202 c. nbtstat -a 193.145.85.202 d. nbtstat -a \\193.145.85.202