ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 155 - CS0-003 discussion

Report
Export

During a recent site survey. an analyst discovered a rogue wireless access point on the network.

Which of the following actions should be taken first to protect the network while preserving evidence?

A.
Run a packet sniffer to monitor traffic to and from the access point.
Answers
A.
Run a packet sniffer to monitor traffic to and from the access point.
B.
Connect to the access point and examine its log files.
Answers
B.
Connect to the access point and examine its log files.
C.
Identify who is connected to the access point and attempt to find the attacker.
Answers
C.
Identify who is connected to the access point and attempt to find the attacker.
D.
Disconnect the access point from the network
Answers
D.
Disconnect the access point from the network
Suggested answer: D

Explanation:

The correct answer is D. Disconnect the access point from the network.

A rogue access point is a wireless access point that has been installed on a network without the authorization or knowledge of the network administrator. A rogue access point can pose a serious security risk, as it can allow unauthorized users to access the network, intercept network traffic, or launch attacks against the network or its devices1234.

The first action that should be taken to protect the network while preserving evidence is to disconnect the rogue access point from the network. This will prevent any further damage or compromise of the network by blocking the access point from communicating with other devices or users. Disconnecting the rogue access point will also preserve its state and configuration, which can be useful for forensic analysis and investigation. Disconnecting the rogue access point can be done physically by unplugging it from the network port or wirelessly by disabling its radio frequency5.

The other options are not the best actions to take first, as they may not protect the network or preserve evidence effectively.

Option A is not the best action to take first, as running a packet sniffer to monitor traffic to and from the access point may not stop the rogue access point from causing harm to the network. A packet sniffer is a tool that captures and analyzes network packets, which are units of data that travel across a network. A packet sniffer can be useful for identifying and troubleshooting network problems, but it may not be able to prevent or block malicious traffic from a rogue access point. Moreover, running a packet sniffer may require additional time and resources, which could delay the response and mitigation of the incident5.

Option B is not the best action to take first, as connecting to the access point and examining its log files may not protect the network or preserve evidence. Connecting to the access point may expose the analyst’s device or credentials to potential attacks or compromise by the rogue access point.

Examining its log files may provide some information about the origin and activity of the rogue access point, but it may also alter or delete some evidence that could be useful for forensic analysis and investigation. Furthermore, connecting to the access point and examining its log files may not prevent or stop the rogue access point from continuing to harm the network5.

Option C is not the best action to take first, as identifying who is connected to the access point and attempting to find the attacker may not protect the network or preserve evidence. Identifying who is connected to the access point may require additional tools or techniques, such as scanning for wireless devices or analyzing network traffic, which could take time and resources away from responding and mitigating the incident. Attempting to find the attacker may also be difficult or impossible, as the attacker may use various methods to hide their identity or location, such as encryption, spoofing, or proxy servers. Moreover, identifying who is connected to the access point and attempting to find the attacker may not prevent or stop the rogue access point from causing further damage or compromise to the network5.

Reference:

1 CompTIA Cybersecurity Analyst (CySA+) Certification Exam Objectives

2 Cybersecurity Analyst+ - CompTIA

3 CompTIA CySA+ CS0-002 Certification Study Guide

4 CertMaster Learn for CySA+ Training - CompTIA

5 How to Protect Against Rogue Access Points on Wi-Fi - Byos

6 Wireless Access Point Protection: 5 Steps to Find Rogue Wi-Fi Networks …

7 Rogue Access Point - Techopedia

8 Rogue access point - Wikipedia

9 What is a Rogue Access Point (Rogue AP)? - Contextual Security

asked 02/10/2024
Joost Huggers
34 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first