PrepAway - Latest Free Exam Questions & Answers

The "Man in the Middle" threat consists of the possibility of a third party intercepting the private

The “Man in the Middle” threat consists of the possibility of a third party intercepting the private
keys of you and another correspondent, even though you think you’re communicating directly with
each other.

PrepAway - Latest Free Exam Questions & Answers

A.
True

B.
False

Explanation:

: Yes, when you are suffering a “Man in the middle attack” everything seems to be right with your
communication, the problem is that you have an agent in the middle of the communication
capturing your information (data, encryption keys). The difference between a “man in the middle”
attack and a Session Hijacking is that the first is passive. The “Man in the middle” attack is very
difficult to detect.


Leave a Reply