An analyst is developing a proof of concept of a wireless-based attack as part of a penetration test against an organization's network. As part of the attack, the analyst launches a fake access point matching the SSID of the organization's guest access network. When a user connects to the fake access point, the analyst allows the traffic to flow through the access point to the legitimate site while the data traversing the network is logged for latest analysis and exploitation. Which of the following attacks has the analyst successfully performed in this scenario?
A) Bluesnarfing
B) Session hijacking
C) MAC spoofing
D) VLAN hopping
E) Man-in-the-middle
Correct Answer:
Verified
Q65: A small town is attempting to attract
Q66: An office user cannot access local network
Q67: A network engineer arrives at work and
Q68: Which of the following wireless connection types
Q69: A network technician is creating a new
Q71: The security manager reports that individual systems
Q72: A forensic first responder arrives at the
Q73: A network technician has just configured NAC
Q74: A network technician is building a network
Q75: A network administrator has a monitoring system
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents