exam questions

Exam SY0-601 All Questions

View all questions & answers for the SY0-601 exam

Exam SY0-601 topic 1 question 524 discussion

Actual exam question from CompTIA's SY0-601
Question #: 524
Topic #: 1
[All SY0-601 Questions]

A security analyst reports a company policy violation in a case in which a large amount of sensitive data is being downloaded after hours from various mobile devices to an external site. Upon further investigation, the analyst notices that successful login attempts are being conducted with impossible travel times during the same time periods when the unauthorized downloads are occurring. The analyst also discovers a couple of WAPs are using the same SSID, but they have non-standard DHCP configurations and an overlapping channel. Which of the following attacks is being conducted?

  • A. Evil twin
  • B. Jamming
  • C. DNS poisoning
  • D. Bluesnarfing
  • E. DDoS
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
memodrums
Highly Voted 1 year, 4 months ago
starting to notice every WAP question is evil twin.
upvoted 11 times
...
ApplebeesWaiter1122
Highly Voted 1 year, 11 months ago
Selected Answer: A
In an Evil Twin attack, the attacker sets up a rogue wireless access point (WAP) with the same SSID as a legitimate WAP to mimic it and trick users into connecting to the rogue WAP. The rogue WAP is configured to perform various malicious activities, such as intercepting sensitive data, stealing credentials, and performing man-in-the-middle attacks. In this scenario, the large amount of sensitive data being downloaded from various mobile devices to an external site is likely being intercepted and exfiltrated by the attacker via the rogue WAP. The "impossible travel times" in successful login attempts indicate that the attacker is likely performing man-in-the-middle attacks, intercepting user login credentials, and using them to access the company's internal resources and download the sensitive data. The presence of two WAPs using the same SSID with non-standard DHCP configurations and overlapping channels suggests the existence of the rogue WAP, which is characteristic of an Evil Twin attack.
upvoted 7 times
...
MortG7
Most Recent 1 year, 2 months ago
Comptia is in love with CASB, SIEM and Evil Twin.... :)
upvoted 7 times
...
cyberPunk28
1 year, 6 months ago
Selected Answer: A
A. Evil twin
upvoted 1 times
...
jhmint
1 year, 11 months ago
Selected Answer: A
GPT: In this scenario, the presence of wireless access points (WAPs) using the same SSID as the legitimate network, but with non-standard DHCP configurations and overlapping channels, points to an "evil twin" attack. An evil twin attack involves setting up a rogue wireless access point that impersonates a legitimate one, in an attempt to trick users into connecting to it. Once users are connected to the evil twin, the attacker can monitor network traffic, capture sensitive data, and even launch further attacks. The "impossible travel times" could indicate that the users' connections are being redirected through the rogue access point, hence the seemingly improbable login times.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...