0
0
Computer Networksknowledge~10 mins

Man-in-the-middle attacks in Computer Networks - Interactive Code Practice

Choose your learning style9 modes available
Practice - 5 Tasks
Answer the questions below
1fill in blank
easy

Complete the sentence to describe a man-in-the-middle attack.

Computer Networks
A man-in-the-middle attack occurs when an attacker secretly [1] the communication between two parties.
Drag options to blanks, or click blank then click option'
Aintercepts
Bblocks
Cignores
Dencrypts
Attempts:
3 left
💡 Hint
Common Mistakes
Choosing 'blocks' because it sounds like stopping communication, but the attacker actually listens in.
Choosing 'encrypts' which is a security measure, not an attack.
2fill in blank
medium

Complete the sentence to explain how attackers use man-in-the-middle attacks.

Computer Networks
Attackers use man-in-the-middle attacks to [1] sensitive information like passwords or credit card numbers.
Drag options to blanks, or click blank then click option'
Asteal
Bhide
Cdelete
Dencrypt
Attempts:
3 left
💡 Hint
Common Mistakes
Choosing 'hide' because it sounds like protecting, but attackers want to take information.
Choosing 'encrypt' which is used to protect data, not steal it.
3fill in blank
hard

Fix the error in the description of a man-in-the-middle attack.

Computer Networks
In a man-in-the-middle attack, the attacker [1] the communication openly without the knowledge of the parties.
Drag options to blanks, or click blank then click option'
Aignores
Bbroadcasts
Cintercepts
Dencrypts
Attempts:
3 left
💡 Hint
Common Mistakes
Choosing 'broadcasts' which means sending messages openly, not secretly intercepting.
Choosing 'ignores' which means not paying attention.
4fill in blank
hard

Fill both blanks to describe how to protect against man-in-the-middle attacks.

Computer Networks
Using [1] and [2] helps secure communication and prevent attackers from intercepting data.
Drag options to blanks, or click blank then click option'
Aencryption
Bfirewalls
Cpasswords
Dantivirus
Attempts:
3 left
💡 Hint
Common Mistakes
Choosing 'passwords' which protect accounts but do not directly stop interception.
Choosing 'antivirus' which protects against malware, not interception.
5fill in blank
hard

Fill all three blanks to complete the explanation of a man-in-the-middle attack.

Computer Networks
In a man-in-the-middle attack, the attacker [1] communication, [2] messages, and [3] information without detection.
Drag options to blanks, or click blank then click option'
Aintercepts
Balters
Csteals
Dignores
Attempts:
3 left
💡 Hint
Common Mistakes
Choosing 'ignores' which means not paying attention, not correct here.