Q. Those methods that involves a type of attack where attackers intrude into an existing connection to intercept the exchanged data and inject false information is called (Solved)
1. Interception
2. Hacking
3. Snooping
4. Man-In-The-Middle
- d. Man-In-The-Middle