nerdexam
(ISC)2(ISC)2

CISSP · Question #707

CISSP Question #707: Real Exam Question with Answer & Explanation

The correct answer is B: Man-irHht-Middk (MITM). Configuring a Wireless Access Point (WAP) with the same Service Set Identifier (SSID) as another WAP in order to have users unknowingly connect is referred to as a man-in-the-middle (MITM) attack. A MITM attack is a type of attack where an attacker intercepts and alters the commu

Submitted by kev92· Mar 5, 2026Communication and Network Security

Question

Configuring a Wireless Access Point (WAP) with the same Service Set Identifier (SSID) as another WAP in order to have users unknowingly connect is referred to as which of the following?

Options

  • AJamming
  • BMan-irHht-Middk (MITM)
  • CWar driving
  • DInternet Protocol (IP) spoofing

Explanation

Configuring a Wireless Access Point (WAP) with the same Service Set Identifier (SSID) as another WAP in order to have users unknowingly connect is referred to as a man-in-the-middle (MITM) attack. A MITM attack is a type of attack where an attacker intercepts and alters the communication between two parties. By setting up a rogue WAP with the same SSID as a legitimate one, an attacker can trick users into connecting to the malicious WAP and then monitor, modify, or redirect their network traffic. Jamming, war driving, and IP spoofing are other types of wireless attacks, but they do not involve configuring a WAP with the same SSID as

Topics

#wireless attacks#evil twin#Man-in-the-Middle (MITM)#WAP security

Community Discussion

No community discussion yet for this question.

Full CISSP PracticeBrowse All CISSP Questions