Which of the follow...
 
Notifications
Clear all

Which of the following attack vectors was MOST likely used in this scenario?

1 Posts
1 Users
0 Likes
181 Views
(@bulluckrolando)
Noble Member
Joined: 2 years ago
Posts: 664
Topic starter  

A user contacts the help desk to report the following:

✑ Two days ago, a pop-up browser window prompted the user for a name and password after connecting to the corporate wireless SSID. This had never happened before, but the user entered the information as requested.

✑ . The user was able to access the Internet but had trouble accessing the department share until the next day.

✑ . The user is now getting notifications from the bank about unauthorized transactions.

Which of the following attack vectors was MOST likely used in this scenario?

  • A . Rogue access point
  • B . Evil twin
  • C . DNS poisoning
  • D . ARP poisoning

Show Answer Hide Answer

Suggested Answer: A

   
Quote

Latest SY0-601 V1 Dumps Valid Version

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Share: