
Security Plus 701: Man-in-the-Middle Attacks

Interactive Video
•
Computers
•
10th - 12th Grade
•
Hard

Mia Campbell
FREE Resource
Read more
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What are man-in-the-middle attacks also known as?
Phishing attacks
Denial-of-service attacks
Side-channel attacks
On-path attacks
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which tool is used in the lab to act as a proxy for capturing traffic?
Metasploit
Nmap
Burp Suite
Wireshark
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the purpose of setting up a proxy in Burp Suite?
To perform a denial-of-service attack
To encrypt data
To capture and analyze traffic
To block unauthorized access
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the role of the batch script created in the lab?
To block the victim's internet access
To install malware on the victim's system
To redirect the victim's traffic through the attacker's proxy
To encrypt the victim's data
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What should be done if the initial attempt to capture traffic fails?
Restart the computer
Use a different browser
Change the IP address
Disable the firewall
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What HTTP method is used to send data to a web server?
PUT
DELETE
POST
GET
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a security measure to prevent man-in-the-middle attacks?
Sharing passwords
Using encrypted protocols
Disabling antivirus software
Using public Wi-Fi
Create a free account and access millions of resources
Similar Resources on Wayground
11 questions
Network Management Concepts and Proxies

Interactive video
•
10th - 12th Grade
11 questions
Understanding XSS Attacks and Prevention

Interactive video
•
9th - 12th Grade
11 questions
Information Security and the CIA Triad

Interactive video
•
9th - 12th Grade
6 questions
Ransomware Negotiations Spark New Business For Cybersecurity Companies

Interactive video
•
10th - 12th Grade
8 questions
GameStop Data Breach Analysis

Interactive video
•
9th - 12th Grade
11 questions
Understanding Watering Hole Attacks

Interactive video
•
10th - 12th Grade
8 questions
Understanding Man-in-the-Middle Attacks

Interactive video
•
9th - 12th Grade
11 questions
Understanding VLANs and Network Security

Interactive video
•
10th Grade - University
Popular Resources on Wayground
18 questions
Writing Launch Day 1

Lesson
•
3rd Grade
11 questions
Hallway & Bathroom Expectations

Quiz
•
6th - 8th Grade
11 questions
Standard Response Protocol

Quiz
•
6th - 8th Grade
40 questions
Algebra Review Topics

Quiz
•
9th - 12th Grade
4 questions
Exit Ticket 7/29

Quiz
•
8th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
19 questions
Handbook Overview

Lesson
•
9th - 12th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade
Discover more resources for Computers
40 questions
Algebra Review Topics

Quiz
•
9th - 12th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
19 questions
Handbook Overview

Lesson
•
9th - 12th Grade
40 questions
LSHS Student Handbook Review: Pages 7-9

Quiz
•
11th Grade
10 questions
Characteristics of Life

Quiz
•
9th - 10th Grade
10 questions
Essential Lab Safety Practices

Interactive video
•
6th - 10th Grade
20 questions
Scalars, Vectors & Graphs

Quiz
•
11th Grade
62 questions
Spanish Speaking Countries, Capitals, and Locations

Quiz
•
9th - 12th Grade