Ask Question
17 October, 08:46

During the forensic phase of a security investigation, it was discovered that an attacker was able to find private keys on a poorly secured team shared drive. The attacker used those keys to intercept and decrypt sensitive traffic on a web server. Which of the following describes this type of exploit and the potential remediation? A. Session hijacking; network intrusion detection sensorsB. Cross-site scripting; increased encryption key sizesC. Man-in-the-middle; well-controlled storage of private keysD. Rootkit; controlled storage of public keys

+4
Answers (1)
  1. 17 October, 09:43
    0
    C. Man-in-the-middle; well-controlled storage of private keys.

    Explanation:

    During the forensic phase of a security investigation, it was discovered that an attacker was able to find private keys on a poorly secured team shared drive, thus describing a well-controlled storage of private keys.

    The attacker using those keys to intercept and decrypt sensitive traffic on a web server is a Man-in-the-middle attack.
Know the Answer?
Not Sure About the Answer?
Get an answer to your question ✅ “During the forensic phase of a security investigation, it was discovered that an attacker was able to find private keys on a poorly secured ...” in 📙 Computers & Technology if there is no answer or all answers are wrong, use a search bar and try to find the answer among similar questions.
Search for Other Answers