0
0
Computer Networksknowledge~5 mins

Man-in-the-middle attacks in Computer Networks - Cheat Sheet & Quick Revision

Choose your learning style9 modes available
Recall & Review
beginner
What is a Man-in-the-middle (MITM) attack?
A Man-in-the-middle attack is when a hacker secretly intercepts and possibly alters communication between two parties who believe they are directly communicating with each other.
Click to reveal answer
beginner
How does a MITM attacker intercept communication?
The attacker places themselves between the sender and receiver, capturing messages sent between them without their knowledge.
Click to reveal answer
intermediate
Name one common method attackers use to perform MITM attacks.
One common method is Wi-Fi eavesdropping, where attackers set up fake Wi-Fi hotspots to capture data from users who connect to them.
Click to reveal answer
beginner
What is one way to protect against MITM attacks?
Using encrypted connections like HTTPS or VPNs helps protect data by making it unreadable to attackers even if intercepted.
Click to reveal answer
intermediate
Why is verifying digital certificates important in preventing MITM attacks?
Digital certificates confirm the identity of websites or services, helping users avoid fake sites set up by attackers to steal information.
Click to reveal answer
What does a Man-in-the-middle attacker do?
ADeletes files on a computer
BBlocks all internet traffic
CCreates a new user account
DIntercepts communication between two parties
Which of these is a common way to perform a MITM attack?
ASetting up a fake Wi-Fi hotspot
BSending spam emails
CInstalling antivirus software
DUsing a strong password
How can HTTPS help protect against MITM attacks?
ABy blocking pop-up ads
BBy speeding up internet connection
CBy encrypting data between user and website
DBy deleting cookies
What should you check to avoid fake websites in MITM attacks?
AWebsite colors
BDigital certificates
CNumber of images
DFont style
Which action does NOT help prevent MITM attacks?
AUsing public Wi-Fi without protection
BUsing a VPN
CChecking for HTTPS in URLs
DAvoiding suspicious links
Explain what a Man-in-the-middle attack is and how it works.
Think about someone secretly listening or changing messages between two friends.
You got /3 concepts.
    Describe at least two ways to protect yourself from Man-in-the-middle attacks.
    Consider how to keep your messages private and check who you are talking to online.
    You got /3 concepts.