medium
Single Answer
0

Sofia believes that an attacker was able to eavesdrop on legitimate HTTPS communications between her users and remote web servers by engaging in a DNS poisoning attack. After conducting DNS poisoning, what technique would an attacker likely use to conduct this eavesdropping?

Answer Options

A

Man-in-the-middle

B

Brute-force

C

Timing

D

Meet-in-the-middle

Correct Answer: A

Explanation

In a man-in-the-middle attack, the attacker tricks the user into establishing a connection with the attacker. The attacker then establishes a connection to the legitimate server and relays communications between the two, eavesdropping on the contents.