PT0-002 · Question #599
PT0-002 Question #599: Real Exam Question with Answer & Explanation
The correct answer is D: Set up a Wi-Fi access point.. To perform an evil twin attack, the attacker's immediate next step after selecting a location is to set up a rogue Wi-Fi access point that mimics a legitimate public network. This creates the "evil twin" to which unsuspecting users will connect.
Question
An attacker chooses a busy location that has free Wi-Fi with the goal of stealing credit card information. Which of the following actions should the attacker do next to perform an evil twin attack?
Options
- AMonitor the user's data.
- BCreate a strong signal.
- CSend deauthentication packages.
- DSet up a Wi-Fi access point.
Explanation
To perform an evil twin attack, the attacker's immediate next step after selecting a location is to set up a rogue Wi-Fi access point that mimics a legitimate public network. This creates the "evil twin" to which unsuspecting users will connect.
Common mistakes.
- A. Monitoring user data is a consequence and goal of an evil twin attack, but it only happens after users connect to the rogue access point.
- B. While creating a strong signal can help attract users, the fundamental step is establishing the rogue access point itself, which naturally entails a signal.
- C. Sending deauthentication packets can be used to force users off a legitimate AP and onto the evil twin, but setting up the evil twin AP is the prerequisite for this step.
Concept tested. Evil twin attack methodology
Topics
Community Discussion
No community discussion yet for this question.