ExamGecko
Question list
Search
Search

Related questions











Question 136 - 312-50v12 discussion

Report
Export

Eric has discovered a fantastic package of tools named Dsniff on the Internet. He has learnt to use these tools in his lab and is now ready for real world exploitation. He was able to effectively intercept communications between the two entities and establish credentials with both sides of the connections. The two remote ends of the communication never notice that Eric is relaying the information between the two. What would you call this attack?

A.
Interceptor
Answers
A.
Interceptor
B.
Man-in-the-middle
Answers
B.
Man-in-the-middle
C.
ARP Proxy
Answers
C.
ARP Proxy
D.
Poisoning Attack
Answers
D.
Poisoning Attack
Suggested answer: B
asked 18/09/2024
Srikar Gude
31 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first