List of questions
Related questions
Question 40 - ECSS discussion
Paola, a professional hacker, configured her wireless router in an organization's premises and advertised it with a spoofed SSID. She lured victims to connect to the router by sending the fake SSID. She started sniffing all the traffic from the victims that is passing through his wireless router.
Which of the following types of attacks is Paola performing in the above scenario?
A.
Key reinstallation attack
B.
Ad-hoc connection attack
C.
Rogue AP attack
D.
AP MAC spoofing attack
Your answer:
0 comments
Sorted by
Leave a comment first