exam questions

Exam PT0-002 All Questions

View all questions & answers for the PT0-002 exam

Exam PT0-002 topic 1 question 55 discussion

Actual exam question from CompTIA's PT0-002
Question #: 55
Topic #: 1
[All PT0-002 Questions]

A penetration tester has been contracted to review wireless security. The tester has deployed a malicious wireless AP that mimics the configuration of the target enterprise WiFi. The penetration tester now wants to try to force nearby wireless stations to connect to the malicious AP.
Which of the following steps should the tester take NEXT?

  • A. Send deauthentication frames to the stations.
  • B. Perform jamming on all 2.4GHz and 5GHz channels.
  • C. Set the malicious AP to broadcast within dynamic frequency selection channels.
  • D. Modify the malicious AP configuration to not use a preshared key.
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
RRabbit_111
Highly Voted 1 year, 3 months ago
A. Send deauthentication frames to the stations. After deploying a malicious wireless AP that mimics the configuration of the target enterprise WiFi, the next step for the tester should be to try to force nearby wireless stations to connect to the malicious AP. One way to accomplish this is by sending deauthentication frames to the stations. These frames will disconnect the stations from their current connection and make them available to connect to the malicious AP. This is a type of wireless man-in-the-middle (MITM) attack that can allow the tester to capture and analyze the wireless traffic of the connected stations. B. Perform jamming on all 2.4GHz and 5GHz channels. is not a good option as it can cause legal and ethical issues and would be illegal in many countries, it also can cause a disruption to the legitimate wireless network. C. Set the malicious AP to broadcast within dynamic frequency selection channels. is not a good option as it's not a way to force nearby wireless stations to connect to the malicious AP. D. Modify the malicious AP configuration to not use a preshared key. is not a good option as it may make the malicious AP more easily detectable and less effective in capturing wireless traffic.
upvoted 14 times
JayMus
1 year, 3 months ago
RRabit, I appreciate your effort in explaining these answers in details.
upvoted 13 times
...
...
ryanzou
Highly Voted 1 year, 7 months ago
Selected Answer: A
Answer is A
upvoted 8 times
...
AbdallaAM
Most Recent 5 months, 1 week ago
Selected Answer: A
sending deauthentication frames is a focused and commonly used technique in such testing scenarios to encourage client devices to disconnect from their current network and potentially connect to a rogue AP.
upvoted 1 times
...
Kirby87
5 months, 2 weeks ago
To force nearby wireless stations to connect to the malicious AP, the penetration tester should: A. Send deauthentication frames to the stations. Sending deauthentication frames to the nearby wireless stations will disrupt their current connections and may prompt them to reconnect. Since the malicious AP mimics the configuration of the target enterprise WiFi, the stations might automatically connect to it, thinking it's a legitimate access point. This technique can be used to capture information or perform other security assessments on the connected stations.
upvoted 2 times
...
Skater_Grace
6 months, 4 weeks ago
Selected Answer: A
Next step should be de-authentication.
upvoted 1 times
...
solutionz
9 months ago
Selected Answer: A
A. Send deauthentication frames to the stations. This option would facilitate the disconnection from the legitimate network and potentially force the devices to connect to the malicious AP, especially if they were previously connected to an AP with the same SSID and security settings as the malicious one.
upvoted 1 times
...
nickwen007
1 year, 1 month ago
The next step the tester should take is A. Send deauthentication frames to the stations. By sending deauthentication frames, or "deauths", the tester can force the wireless stations to disconnect from their current AP and look for a new one. If the malicious AP is configured correctly, the wireless stations should then be able to connect to it.
upvoted 4 times
...
kloug
1 year, 2 months ago
aaaaaaaaaaaaa
upvoted 3 times
...
Lino_Carbon
1 year, 6 months ago
I think A
upvoted 2 times
...
RightAsTain
1 year, 7 months ago
Has to be A. Jamming the signal would cause a DDos and other frequencies could possibly interfere with other WAPs in the area that don't belong to the customer. Straight out of the book.
upvoted 2 times
...
Pokok2021
1 year, 7 months ago
Why not A? Deauth?
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago