Which of the following describes the type of attack the proxy has been legitimately programmed to perform?

A network administrator is attempting to troubleshoot an issue regarding certificates on a secure
website. During the troubleshooting process, the network administrator notices that the web
gateway proxy on the local network has signed all of the certificates on the local machine. Which
of the following describes the type of attack the proxy has been legitimately programmed to
perform?

A network administrator is attempting to troubleshoot an issue regarding certificates on a secure
website. During the troubleshooting process, the network administrator notices that the web
gateway proxy on the local network has signed all of the certificates on the local machine. Which
of the following describes the type of attack the proxy has been legitimately programmed to
perform?

A.
Transitive access

B.
Spoofing

C.
Man-in-the-middle

D.
Replay



Leave a Reply 0

Your email address will not be published. Required fields are marked *

four + eighteen =