
Understanding Man-in-the-Middle Attacks

Interactive Video
•
Computers, Professional Development, Instructional Technology
•
9th - 12th Grade
•
Hard

Amelia Wright
FREE Resource
Read more
7 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Who is the speaker in the video?
David
Melissa
Sarah
John
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a man-in-the-middle attack?
An attack where the attacker sends spam emails.
An attack where the attacker steals physical devices.
An attack where the attacker eavesdrops and accesses communication between two targets.
An attack where the attacker directly hacks into a system.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is NOT a component of a man-in-the-middle attack?
The attacker
The firewall
The victim
The communication target
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How can an attacker perform a man-in-the-middle attack using physical proximity?
By hacking into a server remotely.
By reading transmitted data from someone using a vulnerable Wi-Fi network.
By sending phishing emails.
By installing malware on a device.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does a browser-based man-in-the-middle attack resemble?
Phishing attacks or malware.
Direct hacking into a system.
Sending spam emails.
Stealing physical devices.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a method to protect against man-in-the-middle attacks?
Disabling HTTPS on websites.
Using weak Wi-Fi credentials.
Avoiding the use of VPNs.
Encrypting access points.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is one way to ensure secure communication on websites and web apps?
Disabling encryption.
Using weak passwords.
Using HTTPS.
Using HTTP.
Similar Resources on Wayground
11 questions
Security Plus 701: Man-in-the-Middle Attacks

Interactive video
•
10th - 12th Grade
6 questions
VOICED : Dos palestinos muertos y otro herido por el ejercito israeli

Interactive video
•
10th Grade - University
6 questions
Zardari says cancer of terrorism will be eliminated

Interactive video
•
9th - 12th Grade
2 questions
VOICED : Identifican a dos hermanos belgas como autores de ataques de Bru

Interactive video
•
9th - 12th Grade
6 questions
CLEAN : Training students to fight cybercrime

Interactive video
•
9th - 12th Grade
2 questions
VOICED : Vehiculo embiste furgon policial en Paris en intento de atentado

Interactive video
•
9th - 12th Grade
2 questions
VOICED : Segundo ataque en Francia al grito Ala es grande

Interactive video
•
9th - 12th Grade
2 questions
VOICED : Siete detenidos en relacion a atentado en Londres

Interactive video
•
9th - 12th Grade
Popular Resources on Wayground
18 questions
Writing Launch Day 1

Lesson
•
3rd Grade
11 questions
Hallway & Bathroom Expectations

Quiz
•
6th - 8th Grade
11 questions
Standard Response Protocol

Quiz
•
6th - 8th Grade
40 questions
Algebra Review Topics

Quiz
•
9th - 12th Grade
4 questions
Exit Ticket 7/29

Quiz
•
8th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
19 questions
Handbook Overview

Lesson
•
9th - 12th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade
Discover more resources for Computers
40 questions
Algebra Review Topics

Quiz
•
9th - 12th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
19 questions
Handbook Overview

Lesson
•
9th - 12th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade
40 questions
LSHS Student Handbook Review: Pages 7-9

Quiz
•
11th Grade
24 questions
Scientific method and variables review

Quiz
•
9th Grade
10 questions
Characteristics of Life

Quiz
•
9th - 10th Grade
19 questions
Mental Health Vocabulary Pre-test

Quiz
•
9th Grade