Q. Those methods that involves a type of attack where attackers intrude into an existing connection to intercept the exchanged data and inject false information is called (Solved)

1. Interception

2. Hacking

3. Snooping

4. Man-In-The-Middle

  • d. Man-In-The-Middle
Subscribe Now

Get All Updates & News