Man in the Middle Attack

Man in the Middle Attack

University

7 Qs

quiz-placeholder

Similar activities

IF5000 Ethernet

IF5000 Ethernet

University

10 Qs

Module 8 (Fundamentals of Cybersecurity_

Module 8 (Fundamentals of Cybersecurity_

University

10 Qs

Cybersecurity

Cybersecurity

9th Grade - University

10 Qs

Resolução de Endereços

Resolução de Endereços

University

12 Qs

Module 10-LAN Security

Module 10-LAN Security

9th Grade - University

9 Qs

Module 9-Address Resolution Protocol

Module 9-Address Resolution Protocol

9th Grade - Professional Development

10 Qs

Kuis OSI

Kuis OSI

10th Grade - University

10 Qs

Quiz JARKOM RMIK & ARS

Quiz JARKOM RMIK & ARS

University

12 Qs

Man in the Middle Attack

Man in the Middle Attack

Assessment

Quiz

Computers

University

Medium

Created by

theMelayu Gamer

Used 14+ times

FREE Resource

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does an attacker in MitM do?

Passive Listener/Active Participant

Active Listener/Passive Participant

Passive Runner/Active Participant

Passive Talker/Active Listener

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does ARP stands for?

Address Retrieve Protocol

Apple Resolution Protocol

Address Resolution Protocol

Address Resolution Pact

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Example of software used for MitM?

Ettercap

EtterMap

EtterRAP

NMAP

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which protocol is secure when browsing website?

HTTP

HTTPS

TELNET

IPV4

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does ARP allow the network to do?

Translate

Transpire

Transport

Tractor

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one is NOT a type of MITM attack?

ARP Spoofing

DHCP Spoofing

MAC Spoofing

DNS Spoofing

7.

OPEN ENDED QUESTION

5 mins • Ungraded

From the lesson conducted, What do you feel is lacking?

Evaluate responses using AI:

OFF