A network administrator is attempting to troubleshoot an issue regarding certificates on a secure website. During the troubleshooting process, the network administrator notices that the web gateway proxy on the local network has signed all of the certificates on the local machine.Which of the following describes the type of attack the proxy has been legitimately programmed to perform?

A. Transitive access
B. Spoofing
C. Man-in-the-middle
D. Replay


Answer: C. Man-in-the-middle

Computer Science & Information Technology

You might also like to view...

Case 2Lynette is a consultant who analyzes company Web sites and then makes recommendations to improve the sites.  She is editing some of the buttons on XYZ Corporation's Web pages.While editing an interactive button, Lynette sees a yellow bar at the top of the page.  She should click the bar, click  ____, and then click Yes .

A. accept the changes B. allow blocked content C. edit the link D. block the content

Computer Science & Information Technology

Which item below is the standard security checklist against which systems are evaluated for a security posture?

A. profile B. threat C. control D. baseline

Computer Science & Information Technology

Match the following terms with their descriptions:I.Attachment controlII.Attachment fieldIII.Fixed-length text fileIV.CSV text fileV.HyperlinkA.Can take you to a websiteB.Uses commas to indicate columnsC.Assigns a number of characters for each fieldD.Files which can be launched from AccessE.Allows you to manage attachments in forms and reports

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Margot is investigating suspicious activity on her network and uses a protocol analyzer to sniff inbound and outbound traffic. She notices an unusual packet that has identical source and destination IP addresses. What type of attack uses this packet type?

A. Fraggle B. Smurf C. Land D. Teardrop

Computer Science & Information Technology