Which one of the following can NOT typically be accomplished using a Man-in-the-middle attack?
A.
DNS spoofing
B.
Session hijacking
C.
Denial of service flooding
D.
Digital signature spoofing
Which one of the following can NOT typically be accomplished using a Man-in-the-middle attack?
Which one of the following can NOT typically be accomplished using a Man-in-the-middle attack?
A.
DNS spoofing
B.
Session hijacking
C.
Denial of service flooding
D.
Digital signature spoofing
check
Not true. Dig Sig spoofing is quite possible as detailed in this information from CISCO:
http://tools.cisco.com/security/center/viewAlert.x?alertId=29187