Explanation
OBJ-2.5: A man-in-the-middle attack (MITM) is an attack where the attacker secretly relays and possibly alters the communications between two parties who believe they are directly communicating with each other. One example of a MITM attack is active eavesdropping, in which the attacker makes independent connections with the victims and relays messages between them to make them believe they are talking directly to each other over a private connection, when in fact the entire conversation is controlled by the attacker. The attacker must be able to intercept all relevant messages passing between the two victims and inject new ones. Spoofing is often used as a method of injecting the attacker into the conversation path between the two parties.
Man-in-the-Middle Attack
A Man-in-the-Middle (MITM) attack is another specific type of spoofing attack where the attacker sits between two communicating hosts and transparently monitors, captures, and relays all communication between them. Man-in-the-middle attacks are used to gain access to authentication and network infrastructure information for future attacks, or to gain direct access to packet contents.
upvoted 1 times
...
This section is not available anymore. Please use the main Exam Page.220-1002 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
betty_boop
Highly Voted 4 years, 9 months agoNat2down
Most Recent 2 years, 8 months ago