Describe a man-in-the-middle attack.
What will be an ideal response?
A man-in-the-middle attack occurs when the attacker is able to intercept or monitor transmissions meant for a different computer. You might think of this as similar to
when someone impersonates another person. In the case of a man-in-the-middle attack, the attacker is literally operating between two communicating computers and has the opportunity to:
• Listen in on communications
• Modify communications
You might also like to view...
A _________ is an individual who is not authorized to use the computer and who penetrates a system’s access controls to exploit a legitimate user’s account.
A) clandestine user B) superuser C) masquerader D) misfeasor
The most popular transmission media option for wired Ethernet networks is UTP cable
Indicate whether the statement is true or false
Sniffers operate at the network layer of the OSI model
Indicate whether the statement is true or false.
What types of packets can be sent as part of a DoS attack?
A. SYN, HMAC and HTTP B. SYN, ICMP and HTML C. SYN, MD5 and HTTP D. SYN, ICMP and HTTP