200-201 · Question #55
200-201 Question #55: Real Exam Question with Answer & Explanation
The correct answer is B: man-in-the-middle. In a man-in-the-middle (MITM) attack, an attacker intercepts communication between two parties without their knowledge. By positioning themselves between the communicating parties, the attacker can eavesdrop on the traffic passing between them, potentially capturing sensitive inf
Question
How does an attacker observe network traffic exchanged between two users?
Options
- Aport scanning
- Bman-in-the-middle
- Ccommand injection
- Ddenial of service
Explanation
In a man-in-the-middle (MITM) attack, an attacker intercepts communication between two parties without their knowledge. By positioning themselves between the communicating parties, the attacker can eavesdrop on the traffic passing between them, potentially capturing sensitive information, modifying data, or even injecting malicious content into the communication.
Topics
Community Discussion
No community discussion yet for this question.