Describe a man-in-the-middle attack.

What will be an ideal response?


A man-in-the-middle attack occurs when the attacker is able to intercept or monitor transmissions meant for a different computer. You might think of this as similar to
when someone impersonates another person. In the case of a man-in-the-middle attack, the attacker is literally operating between two communicating computers and has the opportunity to:
• Listen in on communications
• Modify communications

Computer Science & Information Technology

You might also like to view...

A _________ is an individual who is not authorized to use the computer and who penetrates a system’s access controls to exploit a legitimate user’s account.

A) clandestine user B) superuser C) masquerader D) misfeasor

Computer Science & Information Technology

The most popular transmission media option for wired Ethernet networks is UTP cable

Indicate whether the statement is true or false

Computer Science & Information Technology

Sniffers operate at the network layer of the OSI model

Indicate whether the statement is true or false.

Computer Science & Information Technology

What types of packets can be sent as part of a DoS attack?

A. SYN, HMAC and HTTP B. SYN, ICMP and HTML C. SYN, MD5 and HTTP D. SYN, ICMP and HTTP

Computer Science & Information Technology