題組內容

5. True-false questions : 
Please mark either 'O' or 'X' to respectively answer "yes" or "no" for each subquestion. Notice that you will get  -2 point  for each wrong answer until no point can be deducted from this question.

(5) An attack that one participant in a communication pretends to be someone else is called the man- in-the-middle attack. Such an attack breaches the correctness of identification. A cracker can use this attack to gain access that he/she would not normally be allowed or escalate his/her privileges.