The "Man in the Middle" threat consists of the possibility of a third party intercepting the private keys…

The “Man in the Middle” threat consists of the possibility of a third party intercepting the private
keys of you and another correspondent, even though you think you’re communicating directly with
each other.

The “Man in the Middle” threat consists of the possibility of a third party intercepting the private
keys of you and another correspondent, even though you think you’re communicating directly with
each other.

A.
True

B.
False

Explanation:

: Yes, when you are suffering a “Man in the middle attack” everything seems to be right with your
communication, the problem is that you have an agent in the middle of the communication
capturing your information (data, encryption keys). The difference between a “man in the middle”
attack and a Session Hijacking is that the first is passive. The “Man in the middle” attack is very
difficult to detect.



Leave a Reply 0

Your email address will not be published. Required fields are marked *