Multiple Choice
Which of the following hacker tricks involves placing oneself between two communicating parties and either substituting one's own information in place of one of the parties' information or denying one party access to a session?
A) Man-in-the-middle
B) Denial of service
C) Trojan horse
D) Network sniffing
Correct Answer:

Verified
Correct Answer:
Verified
Q21: Defining security policies and then centrally managing
Q22: A malicious program can be housed inside
Q23: The top security concern among all organizations
Q24: Which of the following areas are considered
Q25: List four common profiles of an "insider"
Q27: Computer attacks by insiders can be among
Q28: Security is often thought by many to
Q29: A certificate is a mechanism to verify
Q30: The security technique used to protect systems
Q31: List five areas exposed to threats and