nerdexam
(ISC)2(ISC)2

CERTIFIED-IN-CYBERSECURITY · Question #193

CERTIFIED-IN-CYBERSECURITY Question #193: Real Exam Question with Answer & Explanation

The correct answer is A: Man-in-the-middle. A man-in-the-middle (MitM) attack is an attack in which an attacker intercepts a connection between a user and a genuine website (see ISC2 Study Guide, Module 2, under Types of Threats). In this attack, the attacker can gain access to the user's data, alter the data, or redirect

Network Security

Question

What type of attack involves attackers intercepting a connection between a user and a genuine website?

Options

  • AMan-in-the-middle
  • BAdvanced Persistent Threat
  • CInsider Threat
  • DMalware

Explanation

A man-in-the-middle (MitM) attack is an attack in which an attacker intercepts a connection between a user and a genuine website (see ISC2 Study Guide, Module 2, under Types of Threats). In this attack, the attacker can gain access to the user's data, alter the data, or redirect the user to a malicious website. WiFi Eavesdropping is one of the most common forms of MitM attacks. Insider threat is an attack in which an attacker uses privileged access to gain access to sensitive data or systems. Malware is malicious software used to gain access to a user's system or data. An advanced persistent threat is an attack in which an attacker uses sophisticated techniques to gain access to a user's system or data over an extended period.

Topics

#Man-in-the-middle#Network attacks#Cybersecurity threats

Community Discussion

No community discussion yet for this question.

Full CERTIFIED-IN-CYBERSECURITY PracticeBrowse All CERTIFIED-IN-CYBERSECURITY Questions