CompTIA Exam Questions

Which of the following BEST describes an attack where communications between two parties…?

Which of the following BEST describes an attack where communications between two parties are
intercepted and forwarded to each party with neither party being aware of the interception and
potential modification to the communications?

A.
Spear phishing

B.
Main-in-the-middle

C.
URL hijacking

D.
Transitive access