Which of the following can take advantage of man-in-the-middle techniques to prevent data exfiltration?
A. DNS poisoning
B. URL hijacking
C. ARP spoofing
D. HTTPS inspection
2 Comments on “Which of the following can take advantage of man-in-the…”
Tragicsays:
can someone please explain?
0
0
JohnnyMacsays:
I think these answers are jacked up. It should be ARP poisoning that MITM attackers use. A: should be DNS Spoofing and C: should be ARP Poisoning. The correct answer is C: but should read ARP Poisoning.
can someone please explain?
0
0
I think these answers are jacked up. It should be ARP poisoning that MITM attackers use. A: should be DNS Spoofing and C: should be ARP Poisoning. The correct answer is C: but should read ARP Poisoning.
https://medium.com/@REPTILEHAUS/arp-poisoning-the-art-of-man-in-the-middle-attacks-46640ed545e2
0
0