PdfPrep.com

Which type of attack is used to eavesdrop on a conversation between two victims?

Which type of attack is used to eavesdrop on a conversation between two victims?
A . distributed overflow
B . buffer overflow
C . cross-site scripting
D . man-in-the-middle

Answer: D

Exit mobile version