1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lilavasa [31]
2 years ago
12

Amber is a hacker who steals information when people enter their personal details on specific websites. She intercepts the publi

c key as it is sent from the Web server to the Web browser and substitutes her own public key in its place. This enables her to intercept the communication and decrypt the symmetric encryption key using her private key.
Computers and Technology
1 answer:
vesna_86 [32]2 years ago
4 0

In the case above, the type of hacking attack is Amber perpetrating is option b. A man-in-the-middle attack.

<h3>What is a person in the middle attack?</h3>

A man-in-the-middle (MiTM) attack is  known to be a form of a type of cyber attack where the attacker is known to often and secretly intercepts and pass messages that occurs between two parties who think they are communicating directly with one another.

Hence, In the case above, the type of hacking attack is Amber perpetrating is option b. A man-in-the-middle attack.

Se full question below

Amber is a hacker who steals information when people enter their personal details on specific websites. She intercepts the public key as it is sent from the Web server to the Web browser and substitutes her own public key in its place. This enables her to intercept the communication and decrypt the symmetric encryption key using her private key.

Which type of hacking attack is Amber perpetrating?

a. A denial-of-service attack

b. A man-in-the-middle attack

c. A drive-by attack

d. A malware attack

Learn more about hacking attack from

brainly.com/question/7065536

#SPJ1

You might be interested in
A camera in manual mode means of the camera will make all the adjustments for the photographer
galben [10]
Manual mode is when the photographer makes all the adjustments themself
7 0
4 years ago
which tag does not display the text in the browser window and makes the sources code mode readable ?​
maxonik [38]

Answer:

HTML comments are not displayed in the browser, but they can help document ... You can add comments to your HTML source by using the following syntax: <! ... you can comment out HTML lines of code, one at a time, to search for errors: ... Use the HTML comment tag to make a comment out of the "This is a comment" text.

Explanation:

Gimme brainliest right now.

3 0
3 years ago
URGENT!!!!
MA_775_DIABLO [31]
"Solve the problem: on the first day in a garden thrived with p% more flowers than in the previous day. Determine the total number of flowers that will bloom in the k days." What I translated. 

We would need to know the other answers before anyone could answer. There was completely no number given. 


8 0
3 years ago
Free Write Friday 2/26/21
Bad White [126]
Write about art bc thags always so cool
4 0
3 years ago
What is the purpose of social networking sites
ipn [44]

Explanation:

social networking sites allow users to share ideas, digital photos and videos, posts, and to inform others about online or real world activities and events with people in their network.

6 0
3 years ago
Other questions:
  • Telecommunications is the transmission of voice and video as well as data and usually implies transmitting a longer distance tha
    5·1 answer
  • What command would you use to list the text files in your
    7·1 answer
  • __________ is when a person feels compelled to acquire and abuse a drug despite the harm it causes him or her personally, and de
    14·1 answer
  • Once a graph has been created, you would need to start over to make any changes to it?
    5·1 answer
  • The following processes are being scheduled using a preemptive, round-robin scheduling algorithm. Each process is assigned a num
    6·1 answer
  • What does the term hardware refer to?
    13·1 answer
  • What does route print do?
    15·1 answer
  • A pedometer treats walking 2,000 steps as walking 1 mile. Write a program whose input is the number of steps, and whose output i
    14·1 answer
  • Adobe gives away the Acrobat Reader to build a market for the sale of software that creates Acrobat files. This is an example of
    5·1 answer
  • Which three options below describe typographic hierarchy?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!