During a Chief Information Security Officer (CISO) convention to discuss security awareness, the attendees are
provided with a network connection to use as a resource. As the convention progresses, one of the attendees
starts to notice delays in the connection, and the HTTPS site requests are reverting to HTTP. Which of the
following BEST describes what is happening?
A. Birthday collision on the certificate key
B. DNS hijacking to reroute traffic
C. Brute force to the access point
D. A SSL/TLS downgrade
provided with a network connection to use as a resource. As the convention progresses, one of the attendees
starts to notice delays in the connection, and the HTTPS site requests are reverting to HTTP. Which of the
following BEST describes what is happening?
A. Birthday collision on the certificate key
B. DNS hijacking to reroute traffic
C. Brute force to the access point
D. A SSL/TLS downgrade