(ISC)2 Certified in Cybersecurity Practice Exam

Disable ads (and more) with a membership for a one time $2.99 payment

Prepare for the (ISC)2 Certified in Cybersecurity Exam with comprehensive quizzes and extensive question banks. Enhance your skills with detailed explanations and practice tests designed to improve your expertise for the certification exam. Get exam-ready now!

Each practice test/flash card set has 50 randomly selected questions from a bank of over 500. You'll get a new set of questions each time!

Practice this question and more.


What does a man-in-the-middle (MitM) attack aim to do?

  1. Increase communication speed by redirecting traffic.

  2. Intercept communication between two parties to eavesdrop or modify data.

  3. Strengthen encryption protocols for safe data transfer.

  4. Facilitate direct communication between users for improved security.

The correct answer is: Intercept communication between two parties to eavesdrop or modify data.

A man-in-the-middle (MitM) attack is a type of cyberattack where an attacker secretly intercepts and relays communications between two parties. The aim is to eavesdrop on the conversation or manipulate the exchanged data without either party being aware of the intrusion. This can occur in various communication methods, such as through unsecured Wi-Fi connections, phishing attacks, or other vulnerabilities in the network. The attacker can capture sensitive information, such as login credentials, or inject malicious code into the data stream, making it a serious threat to confidentiality and integrity. By modifying the data, the attacker could potentially alter transactions or communications, leading to further compromises or fraud. In contrast to the other choices, which either suggest enhancing security or altering the communication process for improved speed or direct connection, the essence of a MitM attack lies in its deceitful nature—interception and manipulation rather than enhancement or facilitation of secure communications.