PrepAway - Latest Free Exam Questions & Answers

Which of the following techniques are used above?

After viewing wireless traffic, an attacker notices the following networks are being broadcasted by
local access points:
Corpnet
Coffeeshop
FreePublicWifi
Using this information the attacker spoofs a response to make nearby laptops connect back to a
malicious device. Which of the following techniques are used above? (Select TWO).

PrepAway - Latest Free Exam Questions & Answers

A.
Blue snarfing

B.
Evil twin

C.
Packet sniffing

D.
War dialing

E.
Rogue access point

Explanation:


Leave a Reply