0
0
Cybersecurityknowledge~10 mins

Man-in-the-middle attacks in Cybersecurity - Interactive Code Practice

Choose your learning style9 modes available
Practice - 5 Tasks
Answer the questions below
1fill in blank
easy

Complete the sentence to describe a man-in-the-middle attack.

Cybersecurity
A man-in-the-middle attack occurs when an attacker secretly [1] communication between two parties.
Drag options to blanks, or click blank then click option'
Aencrypts
Bignores
Cblocks
Dintercepts
Attempts:
3 left
πŸ’‘ Hint
Common Mistakes
Choosing 'blocks' because it sounds like stopping communication, but the attacker wants to listen, not just stop.
Choosing 'encrypts' which is a security action, not an attack.
2fill in blank
medium

Complete the sentence to explain how attackers position themselves in a man-in-the-middle attack.

Cybersecurity
Attackers position themselves [1] the two communicating parties to intercept messages.
Drag options to blanks, or click blank then click option'
Abehind
Bbetween
Cabove
Dbeside
Attempts:
3 left
πŸ’‘ Hint
Common Mistakes
Choosing 'beside' or 'behind' which do not describe the attacker’s position in the communication path.
3fill in blank
hard

Fix the error in the description of a man-in-the-middle attack.

Cybersecurity
In a man-in-the-middle attack, the attacker [1] the messages without the knowledge of either party.
Drag options to blanks, or click blank then click option'
Amodifies
Bblocks
Cignores
Dforwards
Attempts:
3 left
πŸ’‘ Hint
Common Mistakes
Choosing 'blocks' which stops communication but does not describe the attacker's secret action.
Choosing 'forwards' which is part of the attack but does not emphasize the secret change.
4fill in blank
hard

Fill both blanks to complete the explanation of a common defense against man-in-the-middle attacks.

Cybersecurity
Using [1] ensures that messages are encrypted, and [2] verifies the identity of the communicating parties.
Drag options to blanks, or click blank then click option'
Aencryption
Bfirewalls
Cauthentication
Dpasswords
Attempts:
3 left
πŸ’‘ Hint
Common Mistakes
Confusing firewalls or passwords as the main defense in this context.
5fill in blank
hard

Fill all three blanks to complete the description of how a man-in-the-middle attack works.

Cybersecurity
The attacker [1] the communication channel, [2] messages from one party, and [3] them to the other party.
Drag options to blanks, or click blank then click option'
Acontrols
Bintercepts
Cforwards
Dblocks
Attempts:
3 left
πŸ’‘ Hint
Common Mistakes
Mixing up the order of actions or choosing 'controls' which is less precise.