Answer: An attack where the attackers will interrupt a data transfer happening between parties and in which they will pretend to be the legitimate parties.
Explanation: For example think about two people writing letters to each other back and forth. However you, the attacker can intercept the letters and effectively change the message/contents of the letter going to the other person. This is probably not the best explanation, but simply put a man-in-the-middle attack is when an attacker interupts a transfer and pretends to be the legitimate source.
Answer: A) Airline ticket, sales receipts, and packing slips
Explanation:
Transactional information is the data that is used for supporting transaction action of every day in a business unit. This information keeps the record whether the transaction is complete or failed.
- Example - slip of packing, sale receipt etc.
- Other options are incorrect because statistic of sales , spreadsheet ,outcome of sale and projection of growth does not relate with transaction process.
- Thus, the correct option is option(A).