0
0
Cybersecurityknowledge~5 mins

Man-in-the-middle attacks in Cybersecurity - Cheat Sheet & Quick Revision

Choose your learning style9 modes available
Recall & Review
beginner
What is a Man-in-the-middle (MITM) attack?
A Man-in-the-middle attack is when a hacker secretly intercepts and possibly alters communication between two parties without their knowledge.
Click to reveal answer
beginner
How does a MITM attacker intercept communication?
The attacker places themselves between two communicating parties, capturing messages sent between them, often by tricking one or both parties into connecting through the attacker.
Click to reveal answer
intermediate
Name two common methods used in Man-in-the-middle attacks.
Common methods include Wi-Fi eavesdropping (using fake Wi-Fi hotspots) and session hijacking (stealing session cookies to impersonate a user).
Click to reveal answer
beginner
What is one way to protect yourself from MITM attacks?
Using encrypted connections like HTTPS and VPNs helps protect your data by making it hard for attackers to read or change your messages.
Click to reveal answer
beginner
Why is public Wi-Fi risky in the context of MITM attacks?
Public Wi-Fi networks are often unsecured, making it easier for attackers to intercept data sent over them and perform MITM attacks.
Click to reveal answer
What does a Man-in-the-middle attacker do?
ACreates a new user account
BBlocks all internet access
CDeletes files on a computer
DIntercepts communication between two parties
Which of these is a common sign of a MITM attack?
AUnexpected security certificate warnings
BSudden slow internet speed
CComputer overheating
DPop-up ads
How can HTTPS help prevent MITM attacks?
ABy blocking pop-ups
BBy encrypting data between your browser and the website
CBy speeding up your internet
DBy deleting cookies
Why is using a VPN recommended to avoid MITM attacks?
AIt hides your IP address and encrypts your internet traffic
BIt increases your download speed
CIt removes viruses from your device
DIt blocks ads on websites
Which network is most vulnerable to MITM attacks?
AMobile data network
BSecure home Wi-Fi with password
CPublic open Wi-Fi without password
DWired Ethernet connection
Explain what a Man-in-the-middle attack is and how it works.
Think about someone listening in on a private conversation without the speakers knowing.
You got /3 concepts.
    Describe two ways to protect yourself from Man-in-the-middle attacks.
    Focus on methods that keep your data encrypted and secure.
    You got /4 concepts.