Exam4Training

Which attack involves an attacker intercepting communication between two parties, secretly altering it, and then relaying it?

Which attack involves an attacker intercepting communication between two parties, secretly altering it, and then relaying it?
A . Man-in-the-Middle (MitM) attack
B . Trojan horse attack
C . Ransomware attack
D . Buffer overflow attack

Answer: A

Exit mobile version