Which of the following is an attack where an attacker intercepts the communication between a client and server, negotiates cryptographic parameters to decrypt the encrypted content, and obtains confidential information such as system passwords?
A. Chosen-key attack
B. Man-in-the-middle attack
C. Rubber hose attack
D. Chosen-ciphertext attack
Answer: B. Man-in-the-middle attack
Computer Science & Information Technology
You might also like to view...
The ________ Filter enables you to select records to display using a dialog box
Fill in the blank(s) with correct word
Computer Science & Information Technology
Describe the full-knowledge exploit.
What will be an ideal response?
Computer Science & Information Technology
The ____ slider is the set of triangles pointing to the rainbow bar in the dialog box.
A. Brightness B. Saturation C. Hue D. Color
Computer Science & Information Technology
If you're looking for connections within your company, join your company's contact list on Facebook
Indicate whether the statement is true or false
Computer Science & Information Technology