Threat actors have positioned themselves between a source and destination to monitor, capture, and control communications without the knowledge of network users. What type of attack is this?
- MiTM
- eavesdropping
- DoS
- IP address spoofing
Explanation: In man-in-the-middle (MiTM) attacks, a threat actor causes network traffic to pass through his computer. The traffic is then forwarded on as usual. The threat actor can then access then read and analyze the traffic for valuable information.
Exam with this question: 2.2.4 Check Your Understanding - Classify Cyber Attacks
Exam with this question: 13.2.4 Check Your Understanding - Classify Cyber Attacks
Please login or Register to submit your answer