Search Header Logo

Man in the Middle Attack

Authored by theMelayu Gamer

Computers

University

Used 15+ times

Man in the Middle Attack
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does an attacker in MitM do?

Passive Listener/Active Participant

Active Listener/Passive Participant

Passive Runner/Active Participant

Passive Talker/Active Listener

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does ARP stands for?

Address Retrieve Protocol

Apple Resolution Protocol

Address Resolution Protocol

Address Resolution Pact

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Example of software used for MitM?

Ettercap

EtterMap

EtterRAP

NMAP

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which protocol is secure when browsing website?

HTTP

HTTPS

TELNET

IPV4

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does ARP allow the network to do?

Translate

Transpire

Transport

Tractor

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one is NOT a type of MITM attack?

ARP Spoofing

DHCP Spoofing

MAC Spoofing

DNS Spoofing

7.

OPEN ENDED QUESTION

5 mins • Ungraded

From the lesson conducted, What do you feel is lacking?

Evaluate responses using AI:

OFF

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?