PrepAway - Latest Free Exam Questions & Answers

Which of the following is MOST likely occurring?

Ann, the network administrator, has learned from the helpdesk that employees are accessing the wireless network without entering their domain credentials upon
connection. Once the connection is made, they cannot reach any internal resources, while wired network connections operate smoothly. Which of the following is
MOST likely occurring?

PrepAway - Latest Free Exam Questions & Answers

A.
A user has plugged in a personal access point at their desk to connect to the network wirelessly.

B.
The company is currently experiencing an attack on their internal DNS servers.

C.
The company’s WEP encryption has been compromised and WPA2 needs to be implemented instead.

D.
An attacker has installed an access point nearby in an attempt to capture company information.

Explanation:
The question implies that users should be required to enter their domain credentials upon connection to the wireless network. The fact that they are connecting to a
wireless network without being prompted for their domain credentials and they are unable to access network resources suggests they are connecting to a rogue
wireless network. A rogue access point is a wireless access point that has either been installed on a secure company network without explicit authorization from a
local network administrator, or has been created to allow a hacker to conduct a man-in-the-middle attack. Rogue access points of the first kind can pose a security
threat to large organizations with many employees, because anyone with access to the premises can install (maliciously or non-maliciously) an inexpensive
wireless router that can potentially allow access to a secure network to unauthorized parties. Rogue access points of the second kind target networks that do not
employ mutual authentication (client-server server- client) and may be used in conjunction with a rogue RADIUS server, depending on security configuration of the
target network.
To prevent the installation of rogue access points, organizations can install wireless intrusion prevention systems to monitor the radio spectrum for unauthorized
access points.
Incorrect Answers:
A: A personal access point would not have the same SSID as the corporate wireless network. Therefore, other network computers would not attempt to connect to
the personal access point.
Therefore, this answer is incorrect.
B: This is not a DNS issue. The users are able to connect to the rogue access point without entering their domain credentials. If the DNS system was
compromised, the users would not be able to connect to the wireless network. Therefore, this answer is incorrect.
C: WEP encryption is considered to be very weak in terms of security and WPA2 is recommended. However, compromised WEP encryption would not cause the
symptoms described in this question. Therefore, this answer is incorrect.

http://en.wikipedia.org/wiki/Rogue_access_point


Leave a Reply