(ISC)2 Certified in Cybersecurity Practice Exam

Disable ads (and more) with a membership for a one time $2.99 payment

Prepare for the (ISC)2 Certified in Cybersecurity Exam with comprehensive quizzes and extensive question banks. Enhance your skills with detailed explanations and practice tests designed to improve your expertise for the certification exam. Get exam-ready now!

Each practice test/flash card set has 50 randomly selected questions from a bank of over 500. You'll get a new set of questions each time!

Practice this question and more.


What type of attack involves an adversary intercepting and altering data between a user and a system?

  1. Insider Threat

  2. Man-in-the-Middle

  3. Phishing Attack

  4. Denial of Service

The correct answer is: Man-in-the-Middle

The Man-in-the-Middle attack is characterized by an adversary intercepting communication between a user and a system, allowing the attacker to eavesdrop on the conversation as well as alter the data being transmitted. This type of attack exploits vulnerabilities in the communication channel, enabling the attacker to manipulate data without either party being aware of the interference. This type of attack is particularly dangerous because users and systems think they are communicating securely with one another while, in fact, an unauthorized party is controlling the communication. The attacker can change the content of the messages, inject malicious data, or even impersonate one of the legitimate parties involved in the communication, which can lead to data breaches, credential theft, or various types of fraud. In contrast, insider threats originate from individuals within an organization who misuse their access to sensitive information. Phishing attacks involve tricking users into providing sensitive information or downloading malware, often through deceptive emails or messages. Denial of Service attacks aim to disrupt access to services or networks, rather than intercepting or altering data. Thus, the defining characteristic of the Man-in-the-Middle attack makes it the correct choice in this context.