Which of the following best describes a man-in-the-middle cyber-attack?

Which of the following best describes a man-in-the-middle cyber-attack?
A . The perpetrator is able to delete data on the network without physical access to the device.
B. The perpetrator is able to exploit network activities for unapproved purposes.
C. The perpetrator is able to take over control of data communication in transit and replace traffic.
D. The perpetrator is able to disable default security controls and introduce additional vulnerabilities

Answer: C

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments