A person enjoys a coffee in the local cafe and decides to catch up on emails while waiting for her friend to arrive. The person tries to log on to the cafe’s Wi-Fi, but the connection looks weak. Fortunately, there is a second Wi-Fi with a similar name, and the person logs on to that. However, an attacker is sitting nearby, having created a Wi-Fi hotspot on their mobile, which they have paired with their laptop. They are monitoring the online activity of everyone who connects to this Wi-Fi.

IT Questions BankCategory: Network Support and SecurityA person enjoys a coffee in the local cafe and decides to catch up on emails while waiting for her friend to arrive. The person tries to log on to the cafe’s Wi-Fi, but the connection looks weak. Fortunately, there is a second Wi-Fi with a similar name, and the person logs on to that. However, an attacker is sitting nearby, having created a Wi-Fi hotspot on their mobile, which they have paired with their laptop. They are monitoring the online activity of everyone who connects to this Wi-Fi.

A person enjoys a coffee in the local cafe and decides to catch up on emails while waiting for her friend to arrive. The person tries to log on to the cafe’s Wi-Fi, but the connection looks weak. Fortunately, there is a second Wi-Fi with a similar name, and the person logs on to that. However, an attacker is sitting nearby, having created a Wi-Fi hotspot on their mobile, which they have paired with their laptop. They are monitoring the online activity of everyone who connects to this Wi-Fi.
What type of attack is this?

  • Evil twin
  • Bluejacking
  • Bluesnarfing
  • Radio frequency jamming

Explanation: Bluejacking and bluesnarfing use wireless Bluetooth technology to carry out an attack.
An evil twin attack describes a situation where the Internet access point of an attacker is set up to look like a better connection option to a legitimate access point.
Radiofrequency jamming describes a situation where the transmission of a radio or satellite station is deliberately blocked to prevent a wireless signal from reaching the receiving station.

Exam with this question: 2.4.7 Check Your Understanding - Wireless and Mobile Device Attacks

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments