Complete the sentence to describe a man-in-the-middle attack.
A man-in-the-middle attack occurs when an attacker secretly [1] the communication between two parties.
In a man-in-the-middle attack, the attacker intercepts the communication to eavesdrop or alter messages.
Complete the sentence to explain how attackers use man-in-the-middle attacks.
Attackers use man-in-the-middle attacks to [1] sensitive information like passwords or credit card numbers.
Attackers steal sensitive information by intercepting communication in man-in-the-middle attacks.
Fix the error in the description of a man-in-the-middle attack.
In a man-in-the-middle attack, the attacker [1] the communication openly without the knowledge of the parties.
The attacker intercepts communication secretly, not openly, to avoid detection.
Fill both blanks to describe how to protect against man-in-the-middle attacks.
Using [1] and [2] helps secure communication and prevent attackers from intercepting data.
Encryption protects data by making it unreadable to attackers, and firewalls block unauthorized access.
Fill all three blanks to complete the explanation of a man-in-the-middle attack.
In a man-in-the-middle attack, the attacker [1] communication, [2] messages, and [3] information without detection.
The attacker intercepts communication, alters messages to mislead, and steals information secretly.