
Understanding Man-in-the-Middle Attacks

Interactive Video
•
Computers, Professional Development, Instructional Technology
•
9th - 12th Grade
•
Hard

Amelia Wright
FREE Resource
Read more
7 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Who is the speaker in the video?
David
Melissa
Sarah
John
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a man-in-the-middle attack?
An attack where the attacker sends spam emails.
An attack where the attacker steals physical devices.
An attack where the attacker eavesdrops and accesses communication between two targets.
An attack where the attacker directly hacks into a system.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is NOT a component of a man-in-the-middle attack?
The attacker
The firewall
The victim
The communication target
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How can an attacker perform a man-in-the-middle attack using physical proximity?
By hacking into a server remotely.
By reading transmitted data from someone using a vulnerable Wi-Fi network.
By sending phishing emails.
By installing malware on a device.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does a browser-based man-in-the-middle attack resemble?
Phishing attacks or malware.
Direct hacking into a system.
Sending spam emails.
Stealing physical devices.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a method to protect against man-in-the-middle attacks?
Disabling HTTPS on websites.
Using weak Wi-Fi credentials.
Avoiding the use of VPNs.
Encrypting access points.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is one way to ensure secure communication on websites and web apps?
Disabling encryption.
Using weak passwords.
Using HTTPS.
Using HTTP.
Similar Resources on Wayground
2 questions
CLEAN : German shooter planned massacre in Halle says prosecutor

Interactive video
•
10th - 12th Grade
2 questions
VOICED : Ataque en suburbio de Tel Aviv deja al menos 5 muertos

Interactive video
•
10th Grade - University
2 questions
CLEAN : Partner of France attacker has been detained: prosecutor

Interactive video
•
10th - 12th Grade
3 questions
CLEAN : Police at the scene after deadly attacks in Israel

Interactive video
•
10th Grade - University
2 questions
VOICED : Un adolescente se "hace estallar" en una escuela ortodoxa en Rusia y deja diez heridos

Interactive video
•
9th - 10th Grade
2 questions
VOICED : Ataque del EI contra mezquita deja 20 muertos en Kabul

Interactive video
•
10th Grade - University
3 questions
VOICED : Hollande: 50 heridos en estado critico tras ataque en Francia

Interactive video
•
10th Grade - University
3 questions
VOICED : Niza reza por victimas; gobierno busca complices de ataque

Interactive video
•
10th Grade - University
Popular Resources on Wayground
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
10 questions
Nouns, nouns, nouns

Quiz
•
3rd Grade
10 questions
9/11 Experience and Reflections

Interactive video
•
10th - 12th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
11 questions
All about me

Quiz
•
Professional Development
22 questions
Adding Integers

Quiz
•
6th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
9 questions
Tips & Tricks

Lesson
•
6th - 8th Grade
Discover more resources for Computers
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade
10 questions
1.2 OSI & TCP IP Models Quiz

Quiz
•
10th Grade
20 questions
Digital Citizenship

Quiz
•
8th - 12th Grade
30 questions
Introduction to Computers

Quiz
•
8th - 9th Grade
35 questions
Computer Baseline Examination 2025-26

Quiz
•
9th - 12th Grade
13 questions
Problem Solving Process

Quiz
•
9th - 12th Grade
20 questions
Hardware vs. Software Quiz

Quiz
•
7th - 10th Grade
10 questions
Understanding Algorithms with Pseudocode and Flowcharts

Interactive video
•
9th - 12th Grade