A security analyst reports a company policy violation in a case in which a large amount of sensitive data is being downloaded after hours from various mobile devices to an external site. Upon further investigation, the analyst notices that successful login attempts are being conducted with impossible travel times during the same time periods when the unauthorized downloads are occurring. The analyst also discovers a couple of WAPs are using the same SSID, but they have non-standard DHCP configurations and an overlapping channel. Which of the following attacks is being conducted?
memodrums
Highly Voted 1 year, 4 months agoApplebeesWaiter1122
Highly Voted 1 year, 11 months agoMortG7
Most Recent 1 year, 2 months agocyberPunk28
1 year, 6 months agojhmint
1 year, 11 months ago