During a successful man-in-the-middle attack, which two of the following actions is an attacker most likely to perform?

IT Questions BankCategory: CCNADuring a successful man-in-the-middle attack, which two of the following actions is an attacker most likely to perform?

During a successful man-in-the-middle attack, which two of the following actions is an attacker most likely to perform?

  • Eavesdrop on traffic passing between hosts
  • Induce a buffer overflow on multiple hosts
  • Modify data passing between hosts
  • Use ping sweeps and port scans to discover the network

Explanation: Once an attacker is in position in a man-in-the-middle attack, traffic between hosts can be passively inspected and actively modified. This type of attack does not lend itself to inducing buffer overflows or using sweeps and scans.

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments