ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 202 - IIA-CIA-Part3 discussion

Report
Export

Which of the following best describes a man-in-the-middle cyber-attack?

A.
The perpetrator is able to delete data on the network without physical access to the device.
Answers
A.
The perpetrator is able to delete data on the network without physical access to the device.
B.
The perpetrator is able to exploit network activities for unapproved purposes.
Answers
B.
The perpetrator is able to exploit network activities for unapproved purposes.
C.
The perpetrator is able to take over control of data communication in transit and replace traffic.
Answers
C.
The perpetrator is able to take over control of data communication in transit and replace traffic.
D.
The perpetrator is able to disable default security controls and introduce additional vulnerabilities
Answers
D.
The perpetrator is able to disable default security controls and introduce additional vulnerabilities
Suggested answer: C
asked 18/09/2024
DMITRY Yunov
33 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first