Ask Question
28 July, 10:42

During the forensic phase of a security investigation, it was discovered that an attacker was able to find private keys on a poorly secured team shared drive. The attacker used those keys to intercept and decrypt sensitive traffic on a web server. Which of the following describes this type of exploit and the potential remediation? A. Session hijacking; network intrusion detection sensorsB. Cross-site scripting; increased encryption key sizesC. Man-in-the-middle; well-controlled storage of private keysD. Rootkit; controlled storage of public keys

+3
Answers (1)
  1. 28 July, 13:15
    0
    C. Man-in-the-middle; well-controlled storage of private keys.

    Explanation:

    During the forensic phase of a security investigation, it was discovered that an attacker was able to find private keys on a poorly secured team shared drive, thus describing a well-controlled storage of private keys.

    The attacker using those keys to intercept and decrypt sensitive traffic on a web server is a Man-in-the-middle attack.
Know the Answer?
Not Sure About the Answer?
Find an answer to your question ✅ “During the forensic phase of a security investigation, it was discovered that an attacker was able to find private keys on a poorly secured ...” in 📘 Computers and Technology if you're in doubt about the correctness of the answers or there's no answer, then try to use the smart search and find answers to the similar questions.
Search for Other Answers