nerdexam
CompTIACompTIA

PT0-002 · Question #599

PT0-002 Question #599: Real Exam Question with Answer & Explanation

The correct answer is D: Set up a Wi-Fi access point.. To perform an evil twin attack, the attacker's immediate next step after selecting a location is to set up a rogue Wi-Fi access point that mimics a legitimate public network. This creates the "evil twin" to which unsuspecting users will connect.

Attacks and Exploits

Question

An attacker chooses a busy location that has free Wi-Fi with the goal of stealing credit card information. Which of the following actions should the attacker do next to perform an evil twin attack?

Options

  • AMonitor the user's data.
  • BCreate a strong signal.
  • CSend deauthentication packages.
  • DSet up a Wi-Fi access point.

Explanation

To perform an evil twin attack, the attacker's immediate next step after selecting a location is to set up a rogue Wi-Fi access point that mimics a legitimate public network. This creates the "evil twin" to which unsuspecting users will connect.

Common mistakes.

  • A. Monitoring user data is a consequence and goal of an evil twin attack, but it only happens after users connect to the rogue access point.
  • B. While creating a strong signal can help attract users, the fundamental step is establishing the rogue access point itself, which naturally entails a signal.
  • C. Sending deauthentication packets can be used to force users off a legitimate AP and onto the evil twin, but setting up the evil twin AP is the prerequisite for this step.

Concept tested. Evil twin attack methodology

Topics

#Evil Twin Attack#Wireless Attacks#Access Point

Community Discussion

No community discussion yet for this question.

Full PT0-002 PracticeBrowse All PT0-002 Questions