List of questions
Related questions
Question 255 - 312-50v12 discussion
Bobby, an attacker, targeted a user and decided to hijack and intercept all their wireless communications. He installed a fake communication tower between two authentic endpoints to mislead the victim. Bobby used this virtual tower to interrupt the data transmission between the user and real tower, attempting to hijack an active session, upon receiving the users request. Bobby manipulated the traffic with the virtual tower and redirected the victim to a malicious website.
What is the attack performed by Bobby in the above scenario?
A.
Wardriving
B.
KRACK attack
C.
jamming signal attack
D.
aLTEr attack
Your answer:
0 comments
Sorted by
Leave a comment first