PrepAway - Latest Free Exam Questions & Answers

Which of the following is this an example of?

A computer supply company is located in a building with three wireless networks. The system
security team implemented a quarterly security scan and saw the following.
SSIDStateChannelLevel
Computer AreUs1connected170dbm
Computer AreUs2connected580dbm
Computer AreUs3connected375dbm
Computer AreUs4connected695dbm
Which of the following is this an example of?

PrepAway - Latest Free Exam Questions & Answers

A.
Rogue access point

B.
Near field communication

C.
Jamming

D.
Packet sniffing

Explanation:
The question states that the building has three wireless networks. However, the scan is showing
four wireless networks with the SSIDs: Computer AreUs1 , Computer AreUs2 , Computer AreUs3
and Computer AreUs4. Therefore, one of these wireless networks probably shouldn’t be there.
This is an example of a rogue access point.
A rogue access point is a wireless access point that has either been installed on a secure
company network without explicit authorization from a local network administrator, or has been
created to allow a hacker to conduct a man-in-the-middle attack. Rogue access points of the first
kind can pose a security threat to large organizations with many employees, because anyone with
access to the premises can install (maliciously or non-maliciously) an inexpensive wireless router
that can potentially allow access to a secure network to unauthorized parties. Rogue access points
of the second kind target networks that do not employ mutual authentication (client-server serverclient) and may be used in conjunction with a rogue RADIUS server, depending on security
configuration of the target network.
To prevent the installation of rogue access points, organizations can install wireless intrusion
prevention systems to monitor the radio spectrum for unauthorized access points.


Leave a Reply