1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lilavasa [31]
2 years ago
12

Amber is a hacker who steals information when people enter their personal details on specific websites. She intercepts the publi

c key as it is sent from the Web server to the Web browser and substitutes her own public key in its place. This enables her to intercept the communication and decrypt the symmetric encryption key using her private key.
Computers and Technology
1 answer:
vesna_86 [32]2 years ago
4 0

In the case above, the type of hacking attack is Amber perpetrating is option b. A man-in-the-middle attack.

<h3>What is a person in the middle attack?</h3>

A man-in-the-middle (MiTM) attack is  known to be a form of a type of cyber attack where the attacker is known to often and secretly intercepts and pass messages that occurs between two parties who think they are communicating directly with one another.

Hence, In the case above, the type of hacking attack is Amber perpetrating is option b. A man-in-the-middle attack.

Se full question below

Amber is a hacker who steals information when people enter their personal details on specific websites. She intercepts the public key as it is sent from the Web server to the Web browser and substitutes her own public key in its place. This enables her to intercept the communication and decrypt the symmetric encryption key using her private key.

Which type of hacking attack is Amber perpetrating?

a. A denial-of-service attack

b. A man-in-the-middle attack

c. A drive-by attack

d. A malware attack

Learn more about hacking attack from

brainly.com/question/7065536

#SPJ1

You might be interested in
Develop a spreadsheet that compares the features, initial purchase price, and a two-year estimate of operating costs (paper, car
antiseptic1488 [7]

Answer:

dgfdghvcsdhjccxadhhvcsdhjvczafjmbd FYI jjgdc

3 0
3 years ago
"the ________ attribute of the anchor tag can cause the new web page to open in its own browser window."
zheka24 [161]
Target





-------------------------------
8 0
3 years ago
Does anyone want to play 2k21 or rocket league on xbox my username is Bud zecaog
blsea [12.9K]

Answer:

i haven't got it

Explanation:

sorry very much dude sorry

3 0
3 years ago
Read 2 more answers
 drag the tiles to the correct boxes to complete pairs match the graphic design tool to its purpose/definition
Inessa [10]

Answer:

1, layers

2. lasso

3.Drawing

4. magic wand

Explanation:

trust

7 0
3 years ago
Tom sends out many e-mails containing secure information to other companies. What concept should be implemented to prove that To
AleksandrR [38]

Answer:

Non-repudiation

Explanation:

Non-repudiation simply means the situation where someone cannot successfully deny the validity of something, is a notion used in computer security that provides source genuineness and the validity of information sent.

4 0
3 years ago
Other questions:
  • In a word processor, Tariq chooses Options from the Tools menu and then selects the Track Changes tab. Which of the following ta
    14·1 answer
  • The process of executing a program is also called ________.
    8·1 answer
  • What did Fulton design in addition to the steamboat
    5·1 answer
  • in cell h5, enter a formula that will calculate the percentage of attendees that went to the Altamonte springs job fair in 2018.
    15·2 answers
  • Which payment type is best if you are trying to stick to a budget?
    6·1 answer
  • Write a python program to calculate the length of any string recursively​
    6·1 answer
  • When resizing images or objects in a presentation, why should a user not utilize the sizing handles in the middle of the sides o
    8·1 answer
  • Meteoroids are small space rocks. They are usually pieces of asteroids or comets. Meteoroids orbit the sun like asteroids and co
    8·1 answer
  • Which of these statements performs real number quotient division using type casting?
    10·1 answer
  • What is an example of fibre optic cable<br>​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!