medium
Single Answer
0Sofia believes that an attacker was able to eavesdrop on legitimate HTTPS communications between her users and remote web servers by engaging in a DNS poisoning attack. After conducting DNS poisoning, what technique would an attacker likely use to conduct this eavesdropping?
Answer Options
A
Man-in-the-middle
B
Brute-force
C
Timing
D
Meet-in-the-middle
Correct Answer: A
Explanation
In a man-in-the-middle attack, the attacker tricks the user into establishing a connection with the attacker. The attacker then establishes a connection to the legitimate server and relays communications between the two, eavesdropping on the contents.