When an attacker presents a program or himself as someone else to obtain private information and pretends to be a legitimate website, network, FTP site, or person in a chat session, what type of attack is occurring?

A. rootkit
B. zombie
C. brute-force
D. man-in-the-middle


Answer: D

Computer Science & Information Technology

You might also like to view...

What are the keyboard shortcuts for Save?

What will be an ideal response?

Computer Science & Information Technology

How can you use the command ls to find out about the size of file /etc/lilo.conf?.

What will be an ideal response?

Computer Science & Information Technology

In a generic class declaration, the class name is followed by a(n) ___________ .

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Paper Cuts is a blog that shares insights into the NBC Nightly News.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology