ISC Exam Questions

Which of the following types of attacks occurs when an attacker successfully inserts an intermediary

Which of the following types of attacks occurs when an attacker successfully inserts an
intermediary software or program between two communicating hosts?

A.
Denial-of-service attack

B.
Dictionary attack

C.
Man-in-the-middle attack

D.
Password guessing attack

Explanation:
When an attacker successfully inserts an intermediary software or program between
two communicating hosts, it is known as man-in-the-middle attack.