Multiple Choice
In the ____________________ attack, an attacker monitors (or sniffs) packets from the network, modifies them, and inserts them back into the network.
A) zombie-in-the-middle
B) sniff-in-the-middle
C) server-in-the-middle
D) man-in-the-middle
Correct Answer:

Verified
Correct Answer:
Verified
Q68: Attacks conducted by scripts are usually unpredictable.
Q69: When information gatherers employ techniques that cross
Q70: Attempting to reverse-calculate a password is called
Q71: The term <u>phreaker</u> is now commonly associated
Q72: Forces of nature, sometimes called acts of
Q74: _ is unsolicited commercial e-mail.
Q75: The average amount of time between hardware
Q76: Information security's primary mission is to ensure
Q77: In the context of information security, _
Q78: The expert hacker sometimes is called a(n)