Which one of the following options best describes an MITM attack?

Posted by: Pdfprep Category: 210-250 Tags: , ,

Which one of the following options best describes an MITM attack?
A . easily detected and not a threat
B . a system that has the ability to view the communication between two systems and imposes itself in the communication path between those other systems
C . a device that connects to a switch and issues an enormous amount of DHCP requests until the DHCP server runs out of IP addresses
D . a device that issues an extremely large amount of SYN requests to a server, preventing all other devices from making a connection

Answer: B

Leave a Reply

Your email address will not be published.