Related questions
Question 202 - IIA-CIA-Part3 discussion
Which of the following best describes a man-in-the-middle cyber-attack?
A.
The perpetrator is able to delete data on the network without physical access to the device.
B.
The perpetrator is able to exploit network activities for unapproved purposes.
C.
The perpetrator is able to take over control of data communication in transit and replace traffic.
D.
The perpetrator is able to disable default security controls and introduce additional vulnerabilities
Your answer:
0 comments
Sorted by
Leave a comment first