For IndividualsFor Educators
ExpertMinds LogoExpertMinds
ExpertMinds

Ace your certifications with Practice Exams and AI assistance.

  • Browse Exams
  • For Educators
  • Blog
  • Privacy Policy
  • Terms of Service
  • Cookie Policy
  • Support
  • AWS SAA Exam Prep
  • PMI PMP Exam Prep
  • CPA Exam Prep
  • GCP PCA Exam Prep

© 2026 TinyHive Labs. Company number 16262776.

    PracticeCPA®CPA ISC Practice Exam 3Question 52
    Easy1 markMultiple Choice
    Area II: SecurityThreatsNetwork Security

    CPA · Question 52 · Area II: Security

    Which of the following attacks involves an attacker intercepting communication between two parties and relaying messages between them?

    Answer options:

    A.

    Denial of Service (DoS)

    B.

    Man-in-the-Middle (MitM)

    C.

    SQL Injection

    D.

    Phishing

    How to approach this question

    Identify the 'eavesdropper' scenario.

    Full Answer

    B.Man-in-the-Middle (MitM)✓ Correct
    B
    A Man-in-the-Middle (MitM) attack occurs when an attacker secretly relays and possibly alters the communications between two parties who believe they are directly communicating with each other.

    Common mistakes

    Confusing MitM with DoS.
    Question 51All questionsQuestion 53

    Practice the full CPA ISC Practice Exam 3

    82 questions · hints · full answers · grading

    Sign up freeTake the exam

    More questions from this exam

    Q01A CPA is advising a client who is migrating their legacy on-premise ERP system to a cloud-based s...MediumQ02During a review of a client's cloud governance structure, an auditor notes that the client uses a...MediumQ03An auditor is evaluating the 'Processing Integrity' principle for a financial institution's loan ...HardQ04A company uses a batch processing system to update inventory records overnight. The 'Grandfather-...HardQ05During a walkthrough of the change management process, an auditor observes that the 'Developer' r...Medium
    View all 82 questions →