SlideShare a Scribd company logo
ARP spoofing is the process of linking MAC address with…………….. a. DNS Server b. IP Address c.
Client server d. All of the above.
ARP spoofing is the process of linking MAC address with an IP address. Therefore, the answer is
option (b).
Q2. Which of the following device use ARP to contact? a. Router b. Gateway c. Both a & b. d.
None of the above.
Both routers and gateways use ARP (Address Resolution Protocol) to contact other devices on a
network. Therefore, the answer is option (c) - Both a & b.
Q4. Which of the following IP used for ARP spoofing? a. Default Gateway b. Subnet Mask c. IPv6
Address d. None of the above.
In ARP spoofing, an attacker sends false ARP messages to link the attacker's MAC address with
the IP address of another device on the network. Therefore, the attacker can use any IP address
on the network, but commonly the attacker will use the IP address of the default gateway or
another device on the network to perform the attack. Thus, the answer is option (a) - Default
Gateway.
Q5. Under which protocol type arp captured packets shown in wire shark application? a. IPv6 b.
IPv4 c. Both a & b d. None of the above.
ARP (Address Resolution Protocol) captured packets are shown under the IPv4 protocol type in
Wireshark application. Therefore, the answer is option (b) - IPv4.
Q7. On which of the following network standards wire shark offers network monitoring? a.
Ethernet b. Wlan c. Bluetooth d. All of the above.
Wireshark offers network monitoring on various network standards, including Ethernet, WLAN
(Wireless Local Area Network), Bluetooth, and many others. Therefore, the answer is option (d) -
All of the above.
Q8. In MITM attack the goal of an attack is to steal………………… a. login credential b. account
details c. credit card numbers d. All of the above
In a Man-in-the-Middle (MITM) attack, the attacker's goal is to intercept and manipulate
communication between two parties and steal sensitive information, such as login credentials,
account details, credit card numbers, or other valuable data. Therefore, the answer is option (d) -
All of the above.
Q9. MITM attacks are carried out through a two-step process known as data interception and
decryption. a. True b. False
False.
MITM attacks are not carried out through a two-step process known as data interception and
decryption. Rather, they involve intercepting and manipulating communication between two
parties, often by intercepting and altering data packets as they pass between the two parties. The
attacker can use various techniques to intercept the communication, such as ARP spoofing, DNS
spoofing, or other methods. Once the attacker has intercepted the communication, they can then
manipulate the data or steal sensitive information.
Q10. Choose correct option which displays username & password in the wire shark application?
a. Get /login.php HTTP/1.1 b. Post /userinfo.php c. Put /status HTTP/1.1 d. None of the above.
The correct option that displays username and password in the Wireshark application is option
(b) - POST /userinfo.php. The HTTP POST method is commonly used to submit login credentials
and other sensitive data to a web server, and the data may be transmitted in the body of the
HTTP request. Therefore, capturing the HTTP POST request can reveal the username and
password.
Q11. Originally wire shark was named Ethereal. a. True b. False
True.
WireShark was originally named Ethereal. It was created in 1998 by Gerald Combs, who initially
named it Ethereal. The name was changed to Wireshark in 2006 due to trademark issues.
Q12. In which of the following year wire shark was introduced? a. 2006 b. 1990 c. 2000 d. None of
the above.
WireShark was introduced in the year 1998.
Q13. A Man in the Middle Attack is……………… a. Malicious software (Virus, Trojans, Spyware). b.
Intercepting data when it is sent. c. Taking down a website by flooding it with data and traffic. d.
Gaining unauthorized access to a computer.
A Man-in-the-Middle (MITM) Attack is a type of cyber attack where an attacker intercepts and
manipulates communication between two parties to steal sensitive information or to perform
other malicious activities. Therefore, the answer is option (b) - Intercepting data when it is sent.
Q14. Once the user logs into the insecure website, the attacker retrieves the user's information
and redirects them to a fake website. a. True b. False
True.
In a phishing attack, the attacker often sets up a fake website that looks similar to a legitimate
website and tricks the user into entering their login credentials. Once the user logs into the fake
website, the attacker retrieves the user's information and can redirect them to a fake website or
the legitimate website to avoid detection. Therefore, the statement is true.
Q15. What are the types of man in the middle attacks? a. IP spoofing b. HTTPS spoofing c. ARP
spoofing d. All of the above.
There are several types of Man-in-the-Middle (MITM) attacks, including:
a. IP Spoofing - where the attacker spoofs or forges IP addresses to redirect traffic to a different
destination than intended.
b. HTTPS Spoofing - where the attacker sets up a fake website with a valid SSL/TLS certificate to
intercept and decrypt encrypted traffic between the user and the legitimate website.
c. ARP Spoofing - where the attacker sends fake Address Resolution Protocol (ARP) messages to
link the attacker's MAC address with the IP address of another device on the network.
Therefore, the answer is option (d) - All of the above.

More Related Content

Similar to lab 5 chat gpt.docx

Sudheer tech seminor
Sudheer tech seminorSudheer tech seminor
Sudheer tech seminor
charankumarreddy muddarla
 
Lecture 7 Attacker and there tools.pptx
Lecture 7 Attacker and there tools.pptxLecture 7 Attacker and there tools.pptx
Lecture 7 Attacker and there tools.pptx
AsmaaLafi1
 
Module 10 (session hijacking)
Module 10 (session hijacking)Module 10 (session hijacking)
Module 10 (session hijacking)
Wail Hassan
 
The Fight against IP Spoofing Attacks: Network Ingress Filtering Versus First...
The Fight against IP Spoofing Attacks: Network Ingress Filtering Versus First...The Fight against IP Spoofing Attacks: Network Ingress Filtering Versus First...
The Fight against IP Spoofing Attacks: Network Ingress Filtering Versus First...
ClaraZara1
 
1)Which of the following are Penetration testing methodology
1)Which of the following are Penetration testing methodology1)Which of the following are Penetration testing methodology
1)Which of the following are Penetration testing methodology
sandibabcock
 
A Deeper Look into Network Traffic Analysis using Wireshark.pdf
A Deeper Look into Network Traffic Analysis using Wireshark.pdfA Deeper Look into Network Traffic Analysis using Wireshark.pdf
A Deeper Look into Network Traffic Analysis using Wireshark.pdf
Jessica Thompson
 
IRJET- Security from Man-In-The-Middle-Attack
IRJET- Security from Man-In-The-Middle-AttackIRJET- Security from Man-In-The-Middle-Attack
IRJET- Security from Man-In-The-Middle-Attack
IRJET Journal
 
THE FIGHT AGAINST IP SPOOFING ATTACKS: NETWORK INGRESS FILTERING VERSUS FIRST...
THE FIGHT AGAINST IP SPOOFING ATTACKS: NETWORK INGRESS FILTERING VERSUS FIRST...THE FIGHT AGAINST IP SPOOFING ATTACKS: NETWORK INGRESS FILTERING VERSUS FIRST...
THE FIGHT AGAINST IP SPOOFING ATTACKS: NETWORK INGRESS FILTERING VERSUS FIRST...
ijsptm
 
What can an attacker can determine which network services are enabled.docx
What can an attacker can determine which network services are enabled.docxWhat can an attacker can determine which network services are enabled.docx
What can an attacker can determine which network services are enabled.docx
todd471
 
Oss web application and network security
Oss   web application and network securityOss   web application and network security
Oss web application and network securityRishabh Mehan
 
Hacking
HackingHacking
Hacking
SUNY Oneonta
 
My ppt..priya
My ppt..priyaMy ppt..priya
My ppt..priya
priya_kp03
 
Embedded device hacking Session i
Embedded device hacking Session iEmbedded device hacking Session i
Embedded device hacking Session i
Malachi Jones
 
Spoofing
SpoofingSpoofing

Similar to lab 5 chat gpt.docx (20)

Sudheer tech seminor
Sudheer tech seminorSudheer tech seminor
Sudheer tech seminor
 
Hacking
HackingHacking
Hacking
 
Lecture 7 Attacker and there tools.pptx
Lecture 7 Attacker and there tools.pptxLecture 7 Attacker and there tools.pptx
Lecture 7 Attacker and there tools.pptx
 
Module 10 (session hijacking)
Module 10 (session hijacking)Module 10 (session hijacking)
Module 10 (session hijacking)
 
Ipspoofing
IpspoofingIpspoofing
Ipspoofing
 
The Fight against IP Spoofing Attacks: Network Ingress Filtering Versus First...
The Fight against IP Spoofing Attacks: Network Ingress Filtering Versus First...The Fight against IP Spoofing Attacks: Network Ingress Filtering Versus First...
The Fight against IP Spoofing Attacks: Network Ingress Filtering Versus First...
 
Eecs 2013-18
Eecs 2013-18Eecs 2013-18
Eecs 2013-18
 
1)Which of the following are Penetration testing methodology
1)Which of the following are Penetration testing methodology1)Which of the following are Penetration testing methodology
1)Which of the following are Penetration testing methodology
 
A Deeper Look into Network Traffic Analysis using Wireshark.pdf
A Deeper Look into Network Traffic Analysis using Wireshark.pdfA Deeper Look into Network Traffic Analysis using Wireshark.pdf
A Deeper Look into Network Traffic Analysis using Wireshark.pdf
 
IRJET- Security from Man-In-The-Middle-Attack
IRJET- Security from Man-In-The-Middle-AttackIRJET- Security from Man-In-The-Middle-Attack
IRJET- Security from Man-In-The-Middle-Attack
 
Presentation1
Presentation1Presentation1
Presentation1
 
THE FIGHT AGAINST IP SPOOFING ATTACKS: NETWORK INGRESS FILTERING VERSUS FIRST...
THE FIGHT AGAINST IP SPOOFING ATTACKS: NETWORK INGRESS FILTERING VERSUS FIRST...THE FIGHT AGAINST IP SPOOFING ATTACKS: NETWORK INGRESS FILTERING VERSUS FIRST...
THE FIGHT AGAINST IP SPOOFING ATTACKS: NETWORK INGRESS FILTERING VERSUS FIRST...
 
6.Routing
6.Routing6.Routing
6.Routing
 
What can an attacker can determine which network services are enabled.docx
What can an attacker can determine which network services are enabled.docxWhat can an attacker can determine which network services are enabled.docx
What can an attacker can determine which network services are enabled.docx
 
Oss web application and network security
Oss   web application and network securityOss   web application and network security
Oss web application and network security
 
Hacking
HackingHacking
Hacking
 
Wa
WaWa
Wa
 
My ppt..priya
My ppt..priyaMy ppt..priya
My ppt..priya
 
Embedded device hacking Session i
Embedded device hacking Session iEmbedded device hacking Session i
Embedded device hacking Session i
 
Spoofing
SpoofingSpoofing
Spoofing
 

Recently uploaded

Why Is Your BMW X3 Hood Not Responding To Release Commands
Why Is Your BMW X3 Hood Not Responding To Release CommandsWhy Is Your BMW X3 Hood Not Responding To Release Commands
Why Is Your BMW X3 Hood Not Responding To Release Commands
Dart Auto
 
Tyre Industrymarket overview with examples of CEAT
Tyre Industrymarket overview with examples of CEATTyre Industrymarket overview with examples of CEAT
Tyre Industrymarket overview with examples of CEAT
kshamashah95
 
What Does the Active Steering Malfunction Warning Mean for Your BMW
What Does the Active Steering Malfunction Warning Mean for Your BMWWhat Does the Active Steering Malfunction Warning Mean for Your BMW
What Does the Active Steering Malfunction Warning Mean for Your BMW
Tanner Motors
 
Why Isn't Your BMW X5's Comfort Access Functioning Properly Find Out Here
Why Isn't Your BMW X5's Comfort Access Functioning Properly Find Out HereWhy Isn't Your BMW X5's Comfort Access Functioning Properly Find Out Here
Why Isn't Your BMW X5's Comfort Access Functioning Properly Find Out Here
Masters European & Gapanese Auto Repair
 
What Does the PARKTRONIC Inoperative, See Owner's Manual Message Mean for You...
What Does the PARKTRONIC Inoperative, See Owner's Manual Message Mean for You...What Does the PARKTRONIC Inoperative, See Owner's Manual Message Mean for You...
What Does the PARKTRONIC Inoperative, See Owner's Manual Message Mean for You...
Autohaus Service and Sales
 
Antique Plastic Traders Company Profile
Antique Plastic Traders Company ProfileAntique Plastic Traders Company Profile
Antique Plastic Traders Company Profile
Antique Plastic Traders
 
一比一原版BC毕业证波士顿学院毕业证成绩单如何办理
一比一原版BC毕业证波士顿学院毕业证成绩单如何办理一比一原版BC毕业证波士顿学院毕业证成绩单如何办理
一比一原版BC毕业证波士顿学院毕业证成绩单如何办理
amvovau
 
Core technology of Hyundai Motor Group's EV platform 'E-GMP'
Core technology of Hyundai Motor Group's EV platform 'E-GMP'Core technology of Hyundai Motor Group's EV platform 'E-GMP'
Core technology of Hyundai Motor Group's EV platform 'E-GMP'
Hyundai Motor Group
 
Ec460b lc Excavator Volvo Service Repair.pdf
Ec460b lc Excavator Volvo Service Repair.pdfEc460b lc Excavator Volvo Service Repair.pdf
Ec460b lc Excavator Volvo Service Repair.pdf
Excavator
 
Statistics5,c.xz,c.;c.;d.c;d;ssssss.pptx
Statistics5,c.xz,c.;c.;d.c;d;ssssss.pptxStatistics5,c.xz,c.;c.;d.c;d;ssssss.pptx
Statistics5,c.xz,c.;c.;d.c;d;ssssss.pptx
coc7987515756
 
一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理
一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理
一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理
psavhef
 
5 Warning Signs Your BMW's Intelligent Battery Sensor Needs Attention
5 Warning Signs Your BMW's Intelligent Battery Sensor Needs Attention5 Warning Signs Your BMW's Intelligent Battery Sensor Needs Attention
5 Warning Signs Your BMW's Intelligent Battery Sensor Needs Attention
Bertini's German Motors
 
gtyccccccccccccccccccccccccccccccccccccccccccccccccccccccc
gtycccccccccccccccccccccccccccccccccccccccccccccccccccccccgtyccccccccccccccccccccccccccccccccccccccccccccccccccccccc
gtyccccccccccccccccccccccccccccccccccccccccccccccccccccccc
4thzenzstar
 
Wondering if Your Mercedes EIS is at Fault Here’s How to Tell
Wondering if Your Mercedes EIS is at Fault Here’s How to TellWondering if Your Mercedes EIS is at Fault Here’s How to Tell
Wondering if Your Mercedes EIS is at Fault Here’s How to Tell
Vic Auto Collision & Repair
 
What Causes 'Trans Failsafe Prog' to Trigger in BMW X5
What Causes 'Trans Failsafe Prog' to Trigger in BMW X5What Causes 'Trans Failsafe Prog' to Trigger in BMW X5
What Causes 'Trans Failsafe Prog' to Trigger in BMW X5
European Service Center
 
Empowering Limpopo Entrepreneurs Consulting SMEs.pptx
Empowering Limpopo Entrepreneurs  Consulting SMEs.pptxEmpowering Limpopo Entrepreneurs  Consulting SMEs.pptx
Empowering Limpopo Entrepreneurs Consulting SMEs.pptx
Precious Mvulane CA (SA),RA
 
Things to remember while upgrading the brakes of your car
Things to remember while upgrading the brakes of your carThings to remember while upgrading the brakes of your car
Things to remember while upgrading the brakes of your car
jennifermiller8137
 
Ec330B Lc Excavator Volvo Service Repair.pdf
Ec330B Lc Excavator Volvo Service Repair.pdfEc330B Lc Excavator Volvo Service Repair.pdf
Ec330B Lc Excavator Volvo Service Repair.pdf
Excavator
 
What Exactly Is The Common Rail Direct Injection System & How Does It Work
What Exactly Is The Common Rail Direct Injection System & How Does It WorkWhat Exactly Is The Common Rail Direct Injection System & How Does It Work
What Exactly Is The Common Rail Direct Injection System & How Does It Work
Motor Cars International
 

Recently uploaded (19)

Why Is Your BMW X3 Hood Not Responding To Release Commands
Why Is Your BMW X3 Hood Not Responding To Release CommandsWhy Is Your BMW X3 Hood Not Responding To Release Commands
Why Is Your BMW X3 Hood Not Responding To Release Commands
 
Tyre Industrymarket overview with examples of CEAT
Tyre Industrymarket overview with examples of CEATTyre Industrymarket overview with examples of CEAT
Tyre Industrymarket overview with examples of CEAT
 
What Does the Active Steering Malfunction Warning Mean for Your BMW
What Does the Active Steering Malfunction Warning Mean for Your BMWWhat Does the Active Steering Malfunction Warning Mean for Your BMW
What Does the Active Steering Malfunction Warning Mean for Your BMW
 
Why Isn't Your BMW X5's Comfort Access Functioning Properly Find Out Here
Why Isn't Your BMW X5's Comfort Access Functioning Properly Find Out HereWhy Isn't Your BMW X5's Comfort Access Functioning Properly Find Out Here
Why Isn't Your BMW X5's Comfort Access Functioning Properly Find Out Here
 
What Does the PARKTRONIC Inoperative, See Owner's Manual Message Mean for You...
What Does the PARKTRONIC Inoperative, See Owner's Manual Message Mean for You...What Does the PARKTRONIC Inoperative, See Owner's Manual Message Mean for You...
What Does the PARKTRONIC Inoperative, See Owner's Manual Message Mean for You...
 
Antique Plastic Traders Company Profile
Antique Plastic Traders Company ProfileAntique Plastic Traders Company Profile
Antique Plastic Traders Company Profile
 
一比一原版BC毕业证波士顿学院毕业证成绩单如何办理
一比一原版BC毕业证波士顿学院毕业证成绩单如何办理一比一原版BC毕业证波士顿学院毕业证成绩单如何办理
一比一原版BC毕业证波士顿学院毕业证成绩单如何办理
 
Core technology of Hyundai Motor Group's EV platform 'E-GMP'
Core technology of Hyundai Motor Group's EV platform 'E-GMP'Core technology of Hyundai Motor Group's EV platform 'E-GMP'
Core technology of Hyundai Motor Group's EV platform 'E-GMP'
 
Ec460b lc Excavator Volvo Service Repair.pdf
Ec460b lc Excavator Volvo Service Repair.pdfEc460b lc Excavator Volvo Service Repair.pdf
Ec460b lc Excavator Volvo Service Repair.pdf
 
Statistics5,c.xz,c.;c.;d.c;d;ssssss.pptx
Statistics5,c.xz,c.;c.;d.c;d;ssssss.pptxStatistics5,c.xz,c.;c.;d.c;d;ssssss.pptx
Statistics5,c.xz,c.;c.;d.c;d;ssssss.pptx
 
一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理
一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理
一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理
 
5 Warning Signs Your BMW's Intelligent Battery Sensor Needs Attention
5 Warning Signs Your BMW's Intelligent Battery Sensor Needs Attention5 Warning Signs Your BMW's Intelligent Battery Sensor Needs Attention
5 Warning Signs Your BMW's Intelligent Battery Sensor Needs Attention
 
gtyccccccccccccccccccccccccccccccccccccccccccccccccccccccc
gtycccccccccccccccccccccccccccccccccccccccccccccccccccccccgtyccccccccccccccccccccccccccccccccccccccccccccccccccccccc
gtyccccccccccccccccccccccccccccccccccccccccccccccccccccccc
 
Wondering if Your Mercedes EIS is at Fault Here’s How to Tell
Wondering if Your Mercedes EIS is at Fault Here’s How to TellWondering if Your Mercedes EIS is at Fault Here’s How to Tell
Wondering if Your Mercedes EIS is at Fault Here’s How to Tell
 
What Causes 'Trans Failsafe Prog' to Trigger in BMW X5
What Causes 'Trans Failsafe Prog' to Trigger in BMW X5What Causes 'Trans Failsafe Prog' to Trigger in BMW X5
What Causes 'Trans Failsafe Prog' to Trigger in BMW X5
 
Empowering Limpopo Entrepreneurs Consulting SMEs.pptx
Empowering Limpopo Entrepreneurs  Consulting SMEs.pptxEmpowering Limpopo Entrepreneurs  Consulting SMEs.pptx
Empowering Limpopo Entrepreneurs Consulting SMEs.pptx
 
Things to remember while upgrading the brakes of your car
Things to remember while upgrading the brakes of your carThings to remember while upgrading the brakes of your car
Things to remember while upgrading the brakes of your car
 
Ec330B Lc Excavator Volvo Service Repair.pdf
Ec330B Lc Excavator Volvo Service Repair.pdfEc330B Lc Excavator Volvo Service Repair.pdf
Ec330B Lc Excavator Volvo Service Repair.pdf
 
What Exactly Is The Common Rail Direct Injection System & How Does It Work
What Exactly Is The Common Rail Direct Injection System & How Does It WorkWhat Exactly Is The Common Rail Direct Injection System & How Does It Work
What Exactly Is The Common Rail Direct Injection System & How Does It Work
 

lab 5 chat gpt.docx

  • 1. ARP spoofing is the process of linking MAC address with…………….. a. DNS Server b. IP Address c. Client server d. All of the above. ARP spoofing is the process of linking MAC address with an IP address. Therefore, the answer is option (b). Q2. Which of the following device use ARP to contact? a. Router b. Gateway c. Both a & b. d. None of the above. Both routers and gateways use ARP (Address Resolution Protocol) to contact other devices on a network. Therefore, the answer is option (c) - Both a & b. Q4. Which of the following IP used for ARP spoofing? a. Default Gateway b. Subnet Mask c. IPv6 Address d. None of the above. In ARP spoofing, an attacker sends false ARP messages to link the attacker's MAC address with the IP address of another device on the network. Therefore, the attacker can use any IP address on the network, but commonly the attacker will use the IP address of the default gateway or another device on the network to perform the attack. Thus, the answer is option (a) - Default Gateway. Q5. Under which protocol type arp captured packets shown in wire shark application? a. IPv6 b. IPv4 c. Both a & b d. None of the above. ARP (Address Resolution Protocol) captured packets are shown under the IPv4 protocol type in Wireshark application. Therefore, the answer is option (b) - IPv4. Q7. On which of the following network standards wire shark offers network monitoring? a. Ethernet b. Wlan c. Bluetooth d. All of the above. Wireshark offers network monitoring on various network standards, including Ethernet, WLAN (Wireless Local Area Network), Bluetooth, and many others. Therefore, the answer is option (d) - All of the above. Q8. In MITM attack the goal of an attack is to steal………………… a. login credential b. account details c. credit card numbers d. All of the above In a Man-in-the-Middle (MITM) attack, the attacker's goal is to intercept and manipulate communication between two parties and steal sensitive information, such as login credentials, account details, credit card numbers, or other valuable data. Therefore, the answer is option (d) - All of the above. Q9. MITM attacks are carried out through a two-step process known as data interception and decryption. a. True b. False False.
  • 2. MITM attacks are not carried out through a two-step process known as data interception and decryption. Rather, they involve intercepting and manipulating communication between two parties, often by intercepting and altering data packets as they pass between the two parties. The attacker can use various techniques to intercept the communication, such as ARP spoofing, DNS spoofing, or other methods. Once the attacker has intercepted the communication, they can then manipulate the data or steal sensitive information. Q10. Choose correct option which displays username & password in the wire shark application? a. Get /login.php HTTP/1.1 b. Post /userinfo.php c. Put /status HTTP/1.1 d. None of the above. The correct option that displays username and password in the Wireshark application is option (b) - POST /userinfo.php. The HTTP POST method is commonly used to submit login credentials and other sensitive data to a web server, and the data may be transmitted in the body of the HTTP request. Therefore, capturing the HTTP POST request can reveal the username and password. Q11. Originally wire shark was named Ethereal. a. True b. False True. WireShark was originally named Ethereal. It was created in 1998 by Gerald Combs, who initially named it Ethereal. The name was changed to Wireshark in 2006 due to trademark issues. Q12. In which of the following year wire shark was introduced? a. 2006 b. 1990 c. 2000 d. None of the above. WireShark was introduced in the year 1998. Q13. A Man in the Middle Attack is……………… a. Malicious software (Virus, Trojans, Spyware). b. Intercepting data when it is sent. c. Taking down a website by flooding it with data and traffic. d. Gaining unauthorized access to a computer. A Man-in-the-Middle (MITM) Attack is a type of cyber attack where an attacker intercepts and manipulates communication between two parties to steal sensitive information or to perform other malicious activities. Therefore, the answer is option (b) - Intercepting data when it is sent. Q14. Once the user logs into the insecure website, the attacker retrieves the user's information and redirects them to a fake website. a. True b. False True. In a phishing attack, the attacker often sets up a fake website that looks similar to a legitimate website and tricks the user into entering their login credentials. Once the user logs into the fake website, the attacker retrieves the user's information and can redirect them to a fake website or the legitimate website to avoid detection. Therefore, the statement is true.
  • 3. Q15. What are the types of man in the middle attacks? a. IP spoofing b. HTTPS spoofing c. ARP spoofing d. All of the above. There are several types of Man-in-the-Middle (MITM) attacks, including: a. IP Spoofing - where the attacker spoofs or forges IP addresses to redirect traffic to a different destination than intended. b. HTTPS Spoofing - where the attacker sets up a fake website with a valid SSL/TLS certificate to intercept and decrypt encrypted traffic between the user and the legitimate website. c. ARP Spoofing - where the attacker sends fake Address Resolution Protocol (ARP) messages to link the attacker's MAC address with the IP address of another device on the network. Therefore, the answer is option (d) - All of the above.