You have been alerted to the possibility of someone using an application to capture and manipulate packets as they are passing through your network. What type of threat does this represent?
A.
DDos
B.
Back Door
C.
Spoofing
D.
Man in the Middle
Explanation:
The method used in these attacks place a piece of software between a server and the user. The software intercepts and then sends the information to the server. The server responds back to the software, thinking it is the legitimate client. The attacking software then sends this information on to the server, etc. The man in the
middle software may be recording this information, altering it, or in some other way compromising the security of your system.
Reference: Security + (SYBEX) page 57