Which attack involves a compromise of data that occurs between two end points?
- denial-of-service
- man-in-the-middle attack
- extraction of security parameters
- username enumeration
Answers Explanation & Hints:
Threat actors frequently attempt to access devices over the internet through communication protocols. Some of the most popular remote exploits are as follows: Man-In-the-middle attack (MITM) – The threat actor gets between devices in the system and intercepts all of the data being transmitted. This information could simply be collected or modified for a specific purpose and delivered to its original destination. |