Which of the following BEST describes an attack where communications between…?

Which of the following BEST describes an attack where communications between two parties are
intercepted and forwarded to each party with neither party being aware of the interception and potential
modification to the communications?

Which of the following BEST describes an attack where communications between two parties are
intercepted and forwarded to each party with neither party being aware of the interception and potential
modification to the communications?

A.
Spear phishing

B.
Main-in-the-middle

C.
URL hijacking

D.
Transitive access



Leave a Reply 1

Your email address will not be published. Required fields are marked *

5 × three =


Paul S

Paul S

This week, this is man in the middle MitM. I am pretty sure that Main in the middle is where you keep a major street between you and the person you are communicating with (joke)