ExamGecko
Question list
Search
Search

Related questions











Question 71 - 200-201 discussion

Report
Export

How does an attacker observe network traffic exchanged between two users?

A.

port scanning

Answers
A.

port scanning

B.

man-in-the-middle

Answers
B.

man-in-the-middle

C.

command injection

Answers
C.

command injection

D.

denial of service

Answers
D.

denial of service

Suggested answer: B

Explanation:

A man-in-the-middle (MITM) attack occurs when an attacker secretly intercepts and possibly alters the communication between two parties who believe they are directly communicating with each other. In this scenario, an attacker can observe network traffic exchanged between two users by placing themselves in between their communication channel.Reference:= Cisco Blogs - New Cybersecurity and Cloud Skills to Protect Companies from Cybersecurity Attacks of the Future

asked 07/10/2024
FARIZA MANNAN
39 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first