Which of the following types of attacks occurs when an attacker successfully inserts an intermediary software or program between two communicating hosts?

Which of the following types of attacks occurs when an attacker successfully inserts an
intermediary software or program between two communicating hosts?

Which of the following types of attacks occurs when an attacker successfully inserts an
intermediary software or program between two communicating hosts?

A.
Denial-of-service attack

B.
Dictionary attack

C.
Man-in-the-middle attack

D.
Password guessing attack

Explanation:
When an attacker successfully inserts an intermediary software or program between
two communicating hosts, it is known as man-in-the-middle attack.



Leave a Reply 0

Your email address will not be published. Required fields are marked *