Posted by: Pdfprep
Post Date: October 28, 2020
An analyst is developing a proof of concept of a wireless-based attack as part of a penetration test against an organization’s network. As part of the attack, the analyst launches a fake access point matching the SSID of the organization’s guest access network. When a user connects to the fake access point, the analyst allows the traffic to flow through the access point to the legitimate site while the data traversing the network is logged for latest analysis and exploitation.
Which of the following attacks has the analyst successfully performed in this scenario?
A . Bluesnarfing
B . Session hijacking
C . MAC spoofing
D . VLAN hopping
E . Man-in-the-middle
Answer: E
Leave a Reply