nerdexam
EC-CouncilEC-Council

212-82 · Question #125

212-82 Question #125: Real Exam Question with Answer & Explanation

Sign in or unlock 212-82 to reveal the answer and full explanation for question #125. The question stem and answer options stay visible for context.

Submitted by tom_us· Mar 6, 2026Cloud Security Risks & Threat Mitigation

Question

A renowned research institute with a high-security wireless network recently encountered an advanced cyber attack. The attack was not detected by traditional security measures and resulted in significant data exfiltration. The wireless network was equipped with WPA3 encryption, MAC address filtering, and had disabled SSID broadcasting. Intriguingly. the attack occurred without any noticeable disruption or changes in network performance. After an exhaustive forensic analysis, the cybersecurity team pinpointed the attack method. Which of the following wireless network-specific attacks was most likely used?

Options

  • AJamming Attack, disrupting network communications with interference signals
  • BEvil Twin Attack, where a rogue access point mimics a legitimate one to capture network traffic
  • CBluesnarfing. exploiting Bluetooth connections to access network data
  • DKRACK (Key Reinstallation Attack), exploiting vulnerabilities in the WPA2 protocol

Unlock 212-82 to see the answer

You've previewed enough free 212-82 questions. Unlock 212-82 for full answers, explanations, the timed quiz mode, progress tracking, and the master PDF. Question stem and options stay visible so you can still see what's on the exam.

Topics

#Wireless Security#Evil Twin Attack#Network Threats#Data Exfiltration
Full 212-82 PracticeBrowse All 212-82 Questions