Which of the following BEST describes an attack where c…

Which of the following BEST describes an attack where communications between two parties are intercepted and forwarded to each party with neither party being
aware of the interception and potential modification to the communications?

Which of the following BEST describes an attack where communications between two parties are intercepted and forwarded to each party with neither party being
aware of the interception and potential modification to the communications?

A.
Spear phishing

B.
Main-in-the-middle

C.
URL hijacking

D.
Transitive access



Leave a Reply 0

Your email address will not be published. Required fields are marked *

17 + 18 =