Which of the following best describes a man-in-the-middle cyber-attack?

Which of the following best describes a man-in-the-middle cyber-attack?
A . The perpetrator is able to delete data on the network without physical access to the device.
B . The perpetrator is able to exploit network activities for unapproved purposes.
C . The perpetrator is able to take over control of data communication in transit and replace traffic.
D . The perpetrator is able to disable default security controls and introduce additional vulnerabilities

Answer: C

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments