nerdexam
EC-CouncilEC-Council

312-50V12 · Question #162

312-50V12 Question #162: Real Exam Question with Answer & Explanation

The correct answer is D: Display a captive portal page that warns users about the possibility of Evil Twin attacks. To address Evil Twin attacks on airport Wi-Fi without impacting user experience or requiring software, educating users via a captive portal is the most effective measure. This approach informs travelers about the risk, enabling them to make more secure connection choices.

Submitted by dimitri_ru· Mar 4, 2026Wireless Network, Mobile, IoT, and OT Hacking

Question

You are a cybersecurity consultant for a major airport that offers free Wi-Fi to travelers. The management is concerned about the possibility of "Evil Twin" attacks, where a malicious actor sets up a rogue access point that mimics the legitimate one. They are looking for a solution that would not significantly impact the user experience or require travelers to install additional software. What is the most effective security measure you could recommend that fits these constraints, considering the airport's unique operational environment?

Options

  • ARegularly change the SSID of the airport's Wi-Fi network
  • BUse MAC address filtering on the airport's Wi-Fi network
  • CImplement WPA3 encryption for the airport's Wi-Fi network
  • DDisplay a captive portal page that warns users about the possibility of Evil Twin attacks

Explanation

To address Evil Twin attacks on airport Wi-Fi without impacting user experience or requiring software, educating users via a captive portal is the most effective measure. This approach informs travelers about the risk, enabling them to make more secure connection choices.

Common mistakes.

  • A. Regularly changing the SSID would severely disrupt the user experience, as travelers would constantly need to locate and reconnect to a new network, and it does not prevent an attacker from mimicking the current SSID.
  • B. Using MAC address filtering is impractical for a public Wi-Fi network serving a large, transient population like an airport, as it would require manual registration for every device and can be bypassed by MAC address spoofing.
  • C. Implementing WPA3 encryption, while enhancing the security of legitimate connections, does not inherently prevent an Evil Twin attack where a rogue AP mimics the legitimate network's SSID to trick users into connecting; furthermore, WPA3-Enterprise, which offers stronger authentication, typically requires client-side configuration or credential management that would violate the 'no additional software' constraint.

Concept tested. Public Wi-Fi security, Evil Twin mitigation, user education

Reference. https://www.cisco.com/c/en/us/products/wireless/guest-access.html

Topics

#Evil Twin attacks#Wi-Fi security#social engineering#user awareness

Community Discussion

No community discussion yet for this question.

Full 312-50V12 PracticeBrowse All 312-50V12 Questions