PrepAway - Latest Free Exam Questions & Answers

An analyst is developing a proof of concept of a wireless-based attack as part of a penetration test against a

An analyst is developing a proof of concept of a wireless-based attack as part of a penetration test against an organization-s network. As part of the attack, the analyst launches

a fake access point matching the SSID of the organization-s guest access network. When a user connects to the fake access point, the analyst allows the traffic to flow through the access point to the legitimate site while the data traversing the network i

s logged for latest analysis and exploitation. Which of the following attacks has the analyst successfully performed in this scenario?

A. Bluesnarfing

B. Session hijacking

C. MAC spoofing

D. VLAN hopping

E. Man-in-the-middle

PrepAway - Latest Free Exam Questions & Answers

Leave a Reply