Which attack involves an attacker intercepting communication between two parties, secretly altering it, and then relaying it?
Which attack involves an attacker intercepting communication between two parties, secretly altering it, and then relaying it?
A . Man-in-the-Middle (MitM) attack
B . Trojan horse attack
C . Ransomware attack
D . Buffer overflow attack
Answer: A
Latest C1000-174 Dumps Valid Version with 230 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Subscribe
Login
0 Comments
Inline Feedbacks
View all comments