exam questions

Exam PT0-001 All Questions

View all questions & answers for the PT0-001 exam

Exam PT0-001 topic 1 question 186 discussion

Actual exam question from CompTIA's PT0-001
Question #: 186
Topic #: 1
[All PT0-001 Questions]

A MITM attack is being planned. The first step is to get information flowing through a controlled device. Which of the following should be used to accomplish this?

  • A. Repeating
  • B. War driving
  • C. Evil twin
  • D. Bluejacking
  • E. Replay attack
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️
Reference:
https://www.veracode.com/security/man-middle-attack

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
CybeSecN
Highly Voted 3 years, 9 months ago
The answer is C
upvoted 6 times
[Removed]
3 years, 9 months ago
D A replay attack is a form of man-in-the-middle attack that focuses on capturing and then resending data. Common uses for replay attacks include masquerading to allow an attacker to present credentials to a service or system after capturing them during an authentication process
upvoted 2 times
Shinigami637
3 years, 8 months ago
I disagree; C is the correct answer. The question only asks to get the information. I.e. the capturing, not the resending, of information. An evil twin would be ideal for capturing information.
upvoted 5 times
...
baybay
3 years, 1 month ago
I agree. This is the definition from the CompTIA Pentest+ Study Guide Exam Pt0-001
upvoted 1 times
...
...
...
miabe
Most Recent 2 years, 10 months ago
Selected Answer: C
looks good to me
upvoted 1 times
...
anonamphibian
3 years, 3 months ago
Yes, it does say controlled device but this could be the attackers computer which would in the case of "Evil Twin" be pretending to be a Access Point. Best answer is C
upvoted 1 times
...
casandre123
3 years, 8 months ago
"through a controlled device" is the key here. You could consider bluejacking because you would have a BT enabled device, but bluejacking =! Bluesnarfing, you couldn't do a MiTM with bluejacking, i dunno about with bluesnarfing, you could probably send an arbitrary file to the victim, but that's beyond me.
upvoted 1 times
9SH4
3 years, 7 months ago
Have you taken the test yet?
upvoted 1 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...