Which of the following attacks has the analyst successfully performed in this scenario?

An analyst is developing a proof of concept of a wireless-based attack as part of a penetration test against an organization’s network. As part of the attack, the analyst launches a fake access point matching the SSID of the organization’s guest access network. When a user connects to the fake access point, the analyst allows the traffic to flow through the access point to the legitimate site while the data traversing the network is logged for latest analysis and exploitation.

Which of the following attacks has the analyst successfully performed in this scenario?
A . Bluesnarfing
B . Session hijacking
C . MAC spoofing
D . VLAN hopping
E . Man-in-the-middle

Answer: E

Latest N10-007 Dumps Valid Version with 601 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments