1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lilavasa [31]
2 years ago
12

Amber is a hacker who steals information when people enter their personal details on specific websites. She intercepts the publi

c key as it is sent from the Web server to the Web browser and substitutes her own public key in its place. This enables her to intercept the communication and decrypt the symmetric encryption key using her private key.
Computers and Technology
1 answer:
vesna_86 [32]2 years ago
4 0

In the case above, the type of hacking attack is Amber perpetrating is option b. A man-in-the-middle attack.

<h3>What is a person in the middle attack?</h3>

A man-in-the-middle (MiTM) attack is  known to be a form of a type of cyber attack where the attacker is known to often and secretly intercepts and pass messages that occurs between two parties who think they are communicating directly with one another.

Hence, In the case above, the type of hacking attack is Amber perpetrating is option b. A man-in-the-middle attack.

Se full question below

Amber is a hacker who steals information when people enter their personal details on specific websites. She intercepts the public key as it is sent from the Web server to the Web browser and substitutes her own public key in its place. This enables her to intercept the communication and decrypt the symmetric encryption key using her private key.

Which type of hacking attack is Amber perpetrating?

a. A denial-of-service attack

b. A man-in-the-middle attack

c. A drive-by attack

d. A malware attack

Learn more about hacking attack from

brainly.com/question/7065536

#SPJ1

You might be interested in
Which of the following statements is true?
Free_Kalibri [48]
C, <span>Word processing can be used to create databases of information.</span>
7 0
3 years ago
Read 2 more answers
What can be defined as in information technology environment?
natka813 [3]
Here is your answer

7 0
3 years ago
Read 2 more answers
Who wants to join my go.ogle classroom?
Ostrovityanka [42]

Answer:

sure

Explanation:

8 0
3 years ago
Read 2 more answers
Assume your using a three button mouse to access shortcut menus you would
sergeinik [125]
Normally you would click the right hand/secondary mouse button, but you may configure any of the buttons to work within the Keyboard and Mouse section of the System Preferences, that can lead u to right clicking and it brings up a menu of the things that your possibly able to do .


 hOpe thiss theory hass helped you anyy :)
7 0
4 years ago
Which of the following best explains the different between Cut and Copy? a. When you copy text you are permanently deleting it,
Vilka [71]
B. When you copy text it remains in its original location and places it on the clipboard. Cutting text removes it from its original location and places it on the clipboard

5 0
3 years ago
Read 2 more answers
Other questions:
  • list the network characteristics of the wireless network(s) in the decode -- SSIDs, channels used, AP names, presence of Bluetoo
    6·1 answer
  • Which VMware product would allow administrators, to manage enterprise desktops with increased reliability, security, end-user ha
    11·1 answer
  • Write a class called Counter that represents a simple tally counter, which might be used to count people as they enter a room. T
    9·1 answer
  • What operating system component allows multiple computers to be linked together?
    10·2 answers
  • Purpose of this program:
    12·1 answer
  • Which of the following would not be stored in a cell ?
    14·1 answer
  • What should you remember about typography while creating your résumé?
    5·1 answer
  • Que compone una maquina Rube Goldberg (operadores mecánicos- maquinas simples – mecanismos)
    8·1 answer
  • A series of instructions coded in a language to instruct the computer to perform a task is
    5·1 answer
  • How does ludonarrative apply to game design
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!