How does an attacker observe network traffic exchanged between two users?
A . port scanning
B . man-in-the-middle
C . command injection
D . denial of service
Answer: B
Explanation:
A man-in-the-middle (MITM) attack occurs when an attacker secretly intercepts and possibly alters the communication between two parties who believe they are directly communicating with each other. In this scenario, an attacker can observe network traffic exchanged between two users by placing themselves in between their communication channel.
Reference: = Cisco Blogs – New Cybersecurity and Cloud Skills to Protect Companies from Cybersecurity Attacks of the Future
Latest 200-201 Dumps Valid Version with 154 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund