Assuring two systems that are using IPSec to protect traffic over the internet, what type of general attack could compromise the data?
A.
Spoof Attack
B.
Smurf Attack
C.
Man in the Middle Attack
D.
Trojan Horse Attack
E.
Back Orifice Attack
Explanation:
To compromise the data, the attack would need to be executed before the encryption takes placeat either end of the tunnel. Trojan Horse and Back Orifice attacks both allow for potential data manipulation on host computers. In both cases, the data would be compromised either before encryption or after decryption, so IPsec is not preventing the attack.