CompTIA Network+ N10-006 Q822

An Attacker is sniffing unencrypted wireless traffic on a wireless network. As a wireless user logs into the web-based email, the attacker examines the traffic and uses the intercepted data to access the user’s email immediately. Which of the following attacks BEST describes the events in this scenario?

A. session hijacking
B. DoS attack
C. smurfing
D. man-in-the-middle attack
E. botnet attack

Correct Answer: D