ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 40 - ECSS discussion

Report
Export

Paola, a professional hacker, configured her wireless router in an organization's premises and advertised it with a spoofed SSID. She lured victims to connect to the router by sending the fake SSID. She started sniffing all the traffic from the victims that is passing through his wireless router.

Which of the following types of attacks is Paola performing in the above scenario?

A.

Key reinstallation attack

Answers
A.

Key reinstallation attack

B.

Ad-hoc connection attack

Answers
B.

Ad-hoc connection attack

C.

Rogue AP attack

Answers
C.

Rogue AP attack

D.

AP MAC spoofing attack

Answers
D.

AP MAC spoofing attack

Suggested answer: C

Explanation:

In the given scenario, Paola has set up a rogue wireless access point (AP) with a spoofed SSID. This rogue AP appears legitimate to victims, who unknowingly connect to it. Once connected, Paola can intercept and sniff all the network traffic passing through her rogue AP. This type of attack is known as aRogue AP attack.

EC-Council Certified Security Specialist (E|CSS) course materials and study guide12.

asked 24/10/2024
Ezrah James panuelos
37 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first