Jack is investigating the cause of his company’s failure in winning the bid for a project. He suspects that a hacker could have intervened in the communication session between his company’s employees. Which of the following attack types is he investigating on?
  1. Man-in-the-middle attack
  2. TCP/IP hijacking
  3. Back door attack
  4. Worm
Explanation
Answer: A - A man-in-the-middle attack is a form of active eavesdropping attack that attempts to fool both ends of a communications session into believing the system in the middle is the other end.

Key Takeaway: A man-in-the-middle attack is a form of active eavesdropping in which the attacker makes independent connections with the victims and relays messages between them. Both parties involved in communication are made to believe that they are communicating with each other. In reality the entire conversation is controlled by the attacker. These attacks are successful only when the attacker can impersonate each endpoint to the satisfaction of the other.
Was this helpful? Upvote!
Login to contribute your own answer or details

Top questions

Related questions

Most popular on PracticeQuiz