A MITM attack is being planned. The first step is to get information flowing through a controlled device. Which of the following should be used to accomplish this?
D
A replay attack is a form of man-in-the-middle attack that focuses on
capturing and then resending data. Common uses for replay attacks
include masquerading to allow an attacker to present credentials to a
service or system after capturing them during an authentication process
I disagree; C is the correct answer. The question only asks to get the information. I.e. the capturing, not the resending, of information. An evil twin would be ideal for capturing information.
Yes, it does say controlled device but this could be the attackers computer which would in the case of "Evil Twin" be pretending to be a Access Point.
Best answer is C
"through a controlled device" is the key here. You could consider bluejacking because you would have a BT enabled device, but bluejacking =! Bluesnarfing, you couldn't do a MiTM with bluejacking, i dunno about with bluesnarfing, you could probably send an arbitrary file to the victim, but that's beyond me.
This section is not available anymore. Please use the main Exam Page.PT0-001 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
CybeSecN
Highly Voted 3 years, 9 months ago[Removed]
3 years, 9 months agoShinigami637
3 years, 8 months agobaybay
3 years, 1 month agomiabe
Most Recent 2 years, 10 months agoanonamphibian
3 years, 3 months agocasandre123
3 years, 8 months ago9SH4
3 years, 7 months ago