An administrator at a sister company calls to report a new threat that is making the rounds. According to him, the latest danger is an attack that attempts to intervene in a communications session by inserting a computer between the two systems that are communicating. Which of the following types of attacks does this constitute?
a. Man-in-the-middle attack
b. Backdoor attack
c. Worm
d. TCP/IP hijacking
Answer: A
A man-in-the-middle attack attempts to fool both ends of a communications session into believing the system in the middle is the other end.