ISC Exam Questions

The act of intercepting the first message in a public key exchange and substituting a bogus key for

The act of intercepting the first message in a public key exchange and substituting a bogus key for the original key is an example of which style of attack?

A.
Spoofing

B.
Hijacking

C.
Man In The Middle

D.
Social Engineering

E.
Distributed Denial of Service (DDoS)