PrepAway - Latest Free Exam Questions & Answers

Which of the following has the attacker created?

After viewing wireless traffic, an attacker notices the following networks are being broadcasted by local access points:
Corpnet
Coffeeshop
FreePublicWifi
Using this information the attacker spoofs a response to make nearby laptops connect back to a malicious device. Which of the following has the attacker created?

PrepAway - Latest Free Exam Questions & Answers

A.
Infrastructure as a Service

B.
Load balancer

C.
Evil twin

D.
Virtualized network

Explanation:
In this question, the attacker has created another wireless network that is impersonating one of more of the three wireless networks listed in the question. This is
known as an Evil Twin. An evil twin, in the context of network security, is a rogue or fake wireless access point (WAP) that appears as a genuine hotspot offered by
a legitimate provider. In an evil twin attack, an eavesdropper or hacker fraudulently creates this rogue hotspot to collect the personal data of unsuspecting users.
Sensitive data can be stolen by spying on a connection or using a phishing technique.
For example, a hacker using an evil twin exploit may be positioned near an authentic Wi-Fi access point and discover the service set identifier (SSID) and
frequency. The hacker may then send a radio signal using the exact same frequency and SSID. To end users, the rogue evil twin appears as their legitimate
hotspot with the same name.
In wireless transmissions, evil twins are not a new phenomenon. Historically, they were known as honeypots or base station clones. With the advancement of
wireless technology and the use of wireless devices in public areas, it is very easy for novice users to set up evil twin exploits.
Incorrect Answers:
A: Infrastructure as a Service is a term used to describe cloud based services hosted by cloud service providers. For example, a cloud provider might provide a
web service. The cloud provider hosts the service on virtualized computers behind the scenes. As a customer, you just pay for web service without requiring
knowledge of the hardware that the service is hosted on. This is not what is described in this question. Therefore, this answer is incorrect.

B: A load balancer distributes traffic between servers. For example, you could have two or more web servers hosting your corporate website. The DNS record for
the website will point to the virtual IP of the load balancer. The load balancer will then share web requests between the web servers. This is not what is described in
this question. Therefore, this answer is incorrect.
D: A virtualized network is a network created on physical servers running Hypervisor software such as Microsoft HyperV or VMware VSphere. Virtualized networks
are also used by cloud service providers. A cloud service is a service running on virtual servers. This is not what is described in this question. Therefore, this
answer is incorrect.

http://www.techopedia.com/definition/5057/evil-twin


Leave a Reply