The act of intercepting the first message in a public key exchange and substituting a bogus key for the original key is an example of which style of attack?

The act of intercepting the first message in a public key exchange and substituting a bogus key for the original key is an example of which style of attack?

The act of intercepting the first message in a public key exchange and substituting a bogus key for the original key is an example of which style of attack?

A.
Spoofing

B.
Hijacking

C.
Man In The Middle

D.
Social Engineering

E.
Distributed Denial of Service (DDoS)



Leave a Reply 0

Your email address will not be published. Required fields are marked *