Ask Question

During the forensic phase of a security investigation, it was discovered that an attacker was able to find private keys on a poorly secured team shared drive. The attacker used those keys to intercept and decrypt sensitive traffic on a web server. Which of the following describes this type of exploit and the potential remediation? A. Session hijacking; network intrusion detection sensorsB. Cross-site scripting; increased encryption key sizesC. Man-in-the-middle; well-controlled storage of private keysD. Rootkit; controlled storage of public keys

+1
Answers (1)
  1. 25 February, 23:45
    0
    C. Man-in-the-middle; well-controlled storage of private keys.

    Explanation:

    During the forensic phase of a security investigation, it was discovered that an attacker was able to find private keys on a poorly secured team shared drive, thus describing a well-controlled storage of private keys.

    The attacker using those keys to intercept and decrypt sensitive traffic on a web server is a Man-in-the-middle attack.
Know the Answer?
Not Sure About the Answer?
Find an answer to your question 👍 “During the forensic phase of a security investigation, it was discovered that an attacker was able to find private keys on a poorly secured ...” in 📗 Computers & Technology if the answers seem to be not correct or there’s no answer. Try a smart search to find answers to similar questions.
Search for Other Answers