Which attack involves an attacker intercepting communication between two parties, secretly altering it, and then relaying it?

Which attack involves an attacker intercepting communication between two parties, secretly altering it, and then relaying it?
A . Man-in-the-Middle (MitM) attack
B . Trojan horse attack
C . Ransomware attack
D . Buffer overflow attack

Answer: A

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments