An attacker is using a laptop as a rogue access point to capture all network traffic from a targeted user. Which type of attack is this?

IT Questions BankCategory: CCNA CyberOpsAn attacker is using a laptop as a rogue access point to capture all network traffic from a targeted user. Which type of attack is this?

An attacker is using a laptop as a rogue access point to capture all network traffic from a targeted user. Which type of attack is this?

  • port redirection
  • trust exploitation
  • buffer overflow
  • man in the middle

Explanation: An access attack tries to gain access to a resource using a hijacked account or other means. The five types of access attacks include the following:password – a dictionary is used for repeated login attempts
trust exploitation – uses granted privileges to access unauthorized material
port redirection – uses a compromised internal host to pass traffic through a firewall
man-in-the-middle – an unauthorized device positioned between two legitimate devices in order to redirect or capture traffic
buffer overflow – too much data sent to a memory location that already contains data

Exam with this question: CCNA Cyber Ops (v1.1) – Chapter 6 Exam Answers
Exam with this question: CCNA Security Chapter 1 Exam Answers
Exam with this question: CyberOps Associate (Version 1.0) - Module 16: Attacking the Foundation Quiz Answers
Exam with this question: CCNA Security Chapter 1 Exam (CCNAS v1.2)
Exam with this question: 3.4.2 Attacking the Foundation Quiz
Exam with this question: Endpoint Security: My Knowledge Check Answers

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments