اختبار شهادة Certified Ethical Hacker (CEH) V13

السؤال 7 من 60

كل الأسئلة

Eric used Dsniff tools to intercept communications between two entities, establishing credentials with both sides and relaying all traffic. Neither endpoint notices that Eric is in the middle. What is this attack called?

الخيارات

  • A Interceptor
  • B Man-in-the-middle
  • C ARP Proxy
  • D Poisoning attack

النقاشات

لا توجد نقاشات منشورة لهذا السؤال حالياً.