Primeira página
/
Tecnologia
/
In the __ attack, an attacker monitors (or sniffs)packets from the network, modifies them, and inserts (1pts) them back into the network server-in-the- middle man-in-the-middle zombie-in-the- middle sniff-in-the-middle

Pergunta

In the __ attack, an attacker monitors (or sniffs)packets from the network, modifies them, and inserts (1pts)
them back into the network
server-in-the-
middle
man-in-the-middle
zombie-in-the-
middle
sniff-in-the-middle

In the __ attack, an attacker monitors (or sniffs)packets from the network, modifies them, and inserts (1pts) them back into the network server-in-the- middle man-in-the-middle zombie-in-the- middle sniff-in-the-middle

Solução

expert verifiedVerification of experts
4.7190 Voting
avatar
MateoProfissional · Tutor por 6 anos

Responder

'man-in-the-middle'

Explicação

## Step 1
The problem describes a type of cyber attack where an attacker intercepts, modifies, and reinserts packets into the network. This is a classic description of a "man-in-the-middle" attack.

## Step 2
In a "man-in-the-middle" attack, the attacker secretly intercepts and possibly alters the communication between two parties who believe they are directly communicating with each other. This type of attack is often used to steal sensitive information, such as login credentials, credit card numbers, or other personal data.

## Step 3
The other options provided, such as "server-in," "zombie-in-the-middle," and "sniff-in-the-middle," are not standard terms used to describe this type of attack. Therefore, the correct answer is "man-in-the-middle."
Clique para avaliar: