Which of the following is an attack where an attacker intercepts the communication between a client and server, negotiates cryptographic parameters to decrypt the encrypted content, and obtains confidential information such as system passwords?

A. Chosen-key attack
B. Man-in-the-middle attack
C. Rubber hose attack
D. Chosen-ciphertext attack


Answer: B. Man-in-the-middle attack

Computer Science & Information Technology

You might also like to view...

The ________ Filter enables you to select records to display using a dialog box

Fill in the blank(s) with correct word

Computer Science & Information Technology

Describe the full-knowledge exploit.

What will be an ideal response?

Computer Science & Information Technology

The ____ slider is the set of triangles pointing to the rainbow bar in the dialog box.

A. Brightness B. Saturation C. Hue D. Color

Computer Science & Information Technology

If you're looking for connections within your company, join your company's contact list on Facebook

Indicate whether the statement is true or false

Computer Science & Information Technology