312-50V12 · Question #162
312-50V12 Question #162: Real Exam Question with Answer & Explanation
The correct answer is D: Display a captive portal page that warns users about the possibility of Evil Twin attacks. To address Evil Twin attacks on airport Wi-Fi without impacting user experience or requiring software, educating users via a captive portal is the most effective measure. This approach informs travelers about the risk, enabling them to make more secure connection choices.
Question
You are a cybersecurity consultant for a major airport that offers free Wi-Fi to travelers. The management is concerned about the possibility of "Evil Twin" attacks, where a malicious actor sets up a rogue access point that mimics the legitimate one. They are looking for a solution that would not significantly impact the user experience or require travelers to install additional software. What is the most effective security measure you could recommend that fits these constraints, considering the airport's unique operational environment?
Options
- ARegularly change the SSID of the airport's Wi-Fi network
- BUse MAC address filtering on the airport's Wi-Fi network
- CImplement WPA3 encryption for the airport's Wi-Fi network
- DDisplay a captive portal page that warns users about the possibility of Evil Twin attacks
Explanation
To address Evil Twin attacks on airport Wi-Fi without impacting user experience or requiring software, educating users via a captive portal is the most effective measure. This approach informs travelers about the risk, enabling them to make more secure connection choices.
Common mistakes.
- A. Regularly changing the SSID would severely disrupt the user experience, as travelers would constantly need to locate and reconnect to a new network, and it does not prevent an attacker from mimicking the current SSID.
- B. Using MAC address filtering is impractical for a public Wi-Fi network serving a large, transient population like an airport, as it would require manual registration for every device and can be bypassed by MAC address spoofing.
- C. Implementing WPA3 encryption, while enhancing the security of legitimate connections, does not inherently prevent an Evil Twin attack where a rogue AP mimics the legitimate network's SSID to trick users into connecting; furthermore, WPA3-Enterprise, which offers stronger authentication, typically requires client-side configuration or credential management that would violate the 'no additional software' constraint.
Concept tested. Public Wi-Fi security, Evil Twin mitigation, user education
Reference. https://www.cisco.com/c/en/us/products/wireless/guest-access.html
Topics
Community Discussion
No community discussion yet for this question.