Ace the CompTIA CySA+ Challenge 2025 – Unleash Your Cyber Skills Today!

Question: 1 / 400

Which type of attack involves intercepting and altering communications between two parties?

Phishing attack

Denial-of-Service attack

Man-in-the-middle attack

The type of attack that involves intercepting and altering communications between two parties is known as a man-in-the-middle attack. In this scenario, an attacker positions themselves between the two communicating parties without their knowledge, allowing the attacker to eavesdrop, intercept, and potentially modify the information that is being transmitted. This can have serious implications, as it may lead to unauthorized access to sensitive data, manipulation of transactions, or the dissemination of false information.

In contrast, phishing attacks primarily focus on deceiving individuals into providing sensitive information, such as passwords or credit card details, typically through malicious emails or websites. Denial-of-service attacks aim to make a service unavailable by overwhelming it with traffic, disrupting normal operations, but do not involve interception or alteration of communications. SQL injection attacks involve manipulating database queries to retrieve or modify data without proper authorization, but again, this does not involve intercepting communications in real-time. Therefore, the man-in-the-middle attack is the clear choice when discussing interception and modification of communication between parties.

Get further explanation with Examzify DeepDiveBeta

SQL Injection attack

Next Question

Report this question

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy