A ___________ attack involves intercepting communication between two parties and altering it without their knowledge.
- DDoS
- Man-in-the-Middle
- Phishing
- Spoofing
A Man-in-the-Middle (MitM) attack occurs when a malicious actor intercepts and possibly alters communication between two parties, making them believe they are directly communicating with each other when, in fact, the attacker is in control.
Loading...
Related Quiz
- You're tasked with ensuring secure file transfers within your organization. Which protocol(s) would you recommend and why?
- What is the main benefit of using virtual machines over physical servers?
- Which type of redundancy does database normalization aim to eliminate?
- How does a semaphore differ from a mutex in terms of signaling and resource access?
- What is the purpose of the "Content-Type" header in RESTful API requests?