In the ____________________ attack, an attacker monitors (or sniffs) packets from the network, modifies them, and inserts them back into the network.

A. zombie-in-the-middle
B. sniff-in-the-middle
C. server-in-the-middle
D. man-in-the-middle


Answer: D

Computer Science & Information Technology

You might also like to view...

Any change to graphics being displayed on the screen requires a call to the method ____________ to update the graphics.

(a) paint (b) repaint (c) update (d) all of the above

Computer Science & Information Technology

List the tasks performed by the SQA group.

What will be an ideal response?

Computer Science & Information Technology

Which of the following encrypts the body of a packet, rather than just the password, while sending information?

A. LDAP B. TACACS+ C. ACLs D. RADIUS

Computer Science & Information Technology

Which of the following commands should you use to determine whether there are any shared resources on a Windows computer with the IP address 193.145.85.202?

a. netstat -c 193.145.85.202 b. nbtscan -a 193.145.85.202 c. nbtstat -a 193.145.85.202 d. nbtstat -a \\193.145.85.202

Computer Science & Information Technology