CERTIFIED-IN-CYBERSECURITY · Question #193
CERTIFIED-IN-CYBERSECURITY Question #193: Real Exam Question with Answer & Explanation
The correct answer is A: Man-in-the-middle. A man-in-the-middle (MitM) attack is an attack in which an attacker intercepts a connection between a user and a genuine website (see ISC2 Study Guide, Module 2, under Types of Threats). In this attack, the attacker can gain access to the user's data, alter the data, or redirect
Question
What type of attack involves attackers intercepting a connection between a user and a genuine website?
Options
- AMan-in-the-middle
- BAdvanced Persistent Threat
- CInsider Threat
- DMalware
Explanation
A man-in-the-middle (MitM) attack is an attack in which an attacker intercepts a connection between a user and a genuine website (see ISC2 Study Guide, Module 2, under Types of Threats). In this attack, the attacker can gain access to the user's data, alter the data, or redirect the user to a malicious website. WiFi Eavesdropping is one of the most common forms of MitM attacks. Insider threat is an attack in which an attacker uses privileged access to gain access to sensitive data or systems. Malware is malicious software used to gain access to a user's system or data. An advanced persistent threat is an attack in which an attacker uses sophisticated techniques to gain access to a user's system or data over an extended period.
Topics
Community Discussion
No community discussion yet for this question.