Which of the following best describes a man-in-the-middle attack?

Which of the following best describes a man-in-the-middle attack?
A . Exploiting software vulnerabilities to gain access.
B . Intercepting and altering communications between two parties.
C . Overloading systems with traffic to deny service.
D . Distributing malware to gain system control.

Answer: B

Explanation:

A man-in-the-middle attack intercepts and manipulates communications between two entities without their knowledge.

Latest 112-12 Dumps Valid Version with 100 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments