Multiple Choice
Which of the following are considered to be interception attacks? (Choose all that apply. )
A) denial of service
B) amplification attack
C) man-in-the-middle
D) replay attacks
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q31: What protocol can be used by a
Q32: What type of attack intercepts communication between
Q33: What two locations can be a target
Q34: When an attack is designed to prevent
Q35: How does a buffer overflow attack occur?
Q37: Explain how an attacker can use privilege
Q38: Choose the SQL injection statement example below
Q39: An attack that takes advantage of the
Q40: How does a cross-site scripting (XSS)attack work?
Q41: Where are MAC addresses stored for future