Multiple Choice
Amber is a hacker who steals information when people enter their personal details on specific websites. She intercepts the public key as it is sent from the Web server to the Web browser and substitutes her own public key in its place. This enables her to intercept the communication and decrypt the symmetric encryption key using her private key. Which type of hacking attack is Amber perpetrating?
A) A denial-of-service attack
B) A man-in-the-middle attack
C) A drive-by attack
D) A malware attack
Correct Answer:

Verified
Correct Answer:
Verified
Q12: List the sequence of events that takes
Q13: Giselle, a systems administrator, creates a file
Q14: To prevent man-in-the-middle attacks, Janet, a network
Q15: A 257-bit encryption key is twice as
Q16: WPA3 is immune to wireless cracking tools
Q18: When a CA public/private key pair expires,
Q19: The new system administrator of XYZ company
Q20: Denali wants to store information about all
Q21: By default, where are updates synchronized from
Q22: Lisa, the system administrator of a bank,