What is the weakest link in network security?
- reconnaissance
- access
- DoS
- social engineering
Explanation: Man-in-the-Middle is an access attack in which the threat actor is positioned between legitimate entities in order to read or modify the data that passes between them.
Exam with this question: 2.5.7 Check Your Understanding - Identify the Types of Network Attacks
Exam with this question: 14.3.7 Check Your Understanding - Identify the Types of Network Attacks
Please login or Register to submit your answer