When an attacker presents a program or himself as someone else to obtain private information and pretends to be a legitimate website, network, FTP site, or person in a chat session, what type of attack is occurring?
A. rootkit
B. zombie
C. brute-force
D. man-in-the-middle
Answer: D
Computer Science & Information Technology
You might also like to view...
What are the keyboard shortcuts for Save?
What will be an ideal response?
Computer Science & Information Technology
How can you use the command ls to find out about the size of file /etc/lilo.conf?.
What will be an ideal response?
Computer Science & Information Technology
In a generic class declaration, the class name is followed by a(n) ___________ .
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
Paper Cuts is a blog that shares insights into the NBC Nightly News.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology