Which type of attack works by an attacker operating between two computers in a network and impersonating one computer to intercept communications?

A. malicious port scanning
B. man-in-the-middle
C. denial of service
D. remote procedure call


Answer: B

Computer Science & Information Technology

You might also like to view...

What is one limit to two users working on the same database file at the same time?

What will be an ideal response?

Computer Science & Information Technology

If you have a reference to an exception object, you can use the reference to throw the exception.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

WordArt cannot be edited after it has been inserted in a document.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

To help determine if you want to use a site as a reference, you can check the _______ in a website's URL to see if it tells where a webpage originated.

A. domain B. kernel C. business name D. webpage name

Computer Science & Information Technology