
Understanding Man-in-the-Middle Attacks

Interactive Video
•
Computers, Professional Development, Instructional Technology
•
9th - 12th Grade
•
Hard

Amelia Wright
FREE Resource
Read more
7 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Who is the speaker in the video?
David
Melissa
Sarah
John
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a man-in-the-middle attack?
An attack where the attacker sends spam emails.
An attack where the attacker steals physical devices.
An attack where the attacker eavesdrops and accesses communication between two targets.
An attack where the attacker directly hacks into a system.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is NOT a component of a man-in-the-middle attack?
The attacker
The firewall
The victim
The communication target
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How can an attacker perform a man-in-the-middle attack using physical proximity?
By hacking into a server remotely.
By reading transmitted data from someone using a vulnerable Wi-Fi network.
By sending phishing emails.
By installing malware on a device.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does a browser-based man-in-the-middle attack resemble?
Phishing attacks or malware.
Direct hacking into a system.
Sending spam emails.
Stealing physical devices.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a method to protect against man-in-the-middle attacks?
Disabling HTTPS on websites.
Using weak Wi-Fi credentials.
Avoiding the use of VPNs.
Encrypting access points.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is one way to ensure secure communication on websites and web apps?
Disabling encryption.
Using weak passwords.
Using HTTPS.
Using HTTP.
Similar Resources on Wayground
11 questions
Understanding Open Networks

Interactive video
•
9th - 12th Grade
11 questions
Understanding XSS Attacks and Prevention

Interactive video
•
9th - 12th Grade
2 questions
Lone Surviving Attacker In Paris Massacre Sentenced To Life, No Parole

Interactive video
•
9th - 12th Grade
6 questions
CLEAN : Networks behind Westgate attack must

Interactive video
•
10th - 12th Grade
2 questions
VOICED : Atacante de Noruega era sospechoso de radicalización

Interactive video
•
9th - 12th Grade
3 questions
VOICED : El autor del ataque con sable en escuela de Suecia

Interactive video
•
10th Grade - University
11 questions
Understanding Code Injection Attacks

Interactive video
•
9th - 12th Grade
11 questions
DNS Security and URL Hijacking

Interactive video
•
10th - 12th Grade
Popular Resources on Wayground
50 questions
Trivia 7/25

Quiz
•
12th Grade
11 questions
Standard Response Protocol

Quiz
•
6th - 8th Grade
11 questions
Negative Exponents

Quiz
•
7th - 8th Grade
12 questions
Exponent Expressions

Quiz
•
6th Grade
4 questions
Exit Ticket 7/29

Quiz
•
8th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade
20 questions
One Step Equations All Operations

Quiz
•
6th - 7th Grade
18 questions
"A Quilt of a Country"

Quiz
•
9th Grade
Discover more resources for Computers
50 questions
Trivia 7/25

Quiz
•
12th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade
18 questions
"A Quilt of a Country"

Quiz
•
9th Grade
6 questions
RL.10.1 Cite Evidence

Quiz
•
10th Grade
10 questions
Characteristics of Life

Quiz
•
9th - 10th Grade
14 questions
Algebra 1 SOL Review #1

Quiz
•
9th Grade