Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Ask a Question
What if the public key , in fact belongs to a malicious third party performing a man-in-the-middle attack? what is countermeasure to avoid this scenario?
Home
SAS
What if the public key , in fact belongs to a malicious third party performing a man-in-the-middle...
0
votes
asked
Mar 17, 2021
in
SAS
by
DavidAnderson
What if the public key , in fact belongs to a malicious third party performing a man-in-the-middle attack? what is countermeasure to avoid this scenario?
1. Security Certificate
2. Authentication
3. firewall
4. none of the above
ssa
Please
log in
or
register
to answer this question.
1
Answer
0
votes
answered
Mar 17, 2021
by
DavidAnderson
Security Certificate
Your comment on this answer:
Email me at this address if a comment is added after mine:
Email me if a comment is added after mine
Privacy: Your email address will only be used for sending these notifications.
Related questions
0
votes
Q: In Public-Key cryptography each user has a pair of cryptography keys - a _______ encryption key and a __________decryption Key.
asked
Mar 17, 2021
in
Secure Programming Practices
by
DavidAnderson
ssa
0
votes
Q: Which type of vulnerability allows an attacker to execute a malicious script in a user browser?
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
vulnerability-type
malicious
script
ssa
0
votes
Q: While performing threat modeling for an application design, which of the following is the formula for calculating Risk Score?
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
threat-modeling
threat-application-design
risk-score
ssa
0
votes
Q: Which vulnerability can lead to Denial of Service attack?
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
denial-of-service-attack
dos-attack
ssa
0
votes
Q: Which of the following are the types of vulnerabilities that hackers look out for in application to target them for attacks?
asked
Mar 17, 2021
in
SAS
by
DavidAnderson
ssa
0
votes
Q: session cookies with HTTPOnly flag are not vulnerable to ___ attacks, but are vulnerable to _____attack?
asked
Mar 17, 2021
in
SAS
by
DavidAnderson
ssa
0
votes
Q: Which type of users should be allowed to use system accounts?
asked
Mar 17, 2021
in
SAS
by
DavidAnderson
ssa
0
votes
Q: A race condition in a web server can cause which of the following
asked
Mar 17, 2021
in
SAS
by
DavidAnderson
ssa
0
votes
Q: Impact of Injection attacks?
asked
Mar 17, 2021
in
SAS
by
DavidAnderson
ssa
0
votes
Q: Passwords should not be logged
asked
Mar 17, 2021
in
SAS
by
DavidAnderson
ssa
...