exam questions

Exam SY0-601 All Questions

View all questions & answers for the SY0-601 exam

Exam SY0-601 topic 1 question 227 discussion

Actual exam question from CompTIA's SY0-601
Question #: 227
Topic #: 1
[All SY0-601 Questions]

A user reports constant lag and performance issues with the wireless network when working at a local coffee shop. A security analyst walks the user through an installation of Wireshark and gets a five-minute pcap to analyze. The analyst observes the following output:



Which of the following attacks does the analyst MOST likely see in this packet capture?

  • A. Session replay
  • B. Evil twin
  • C. Bluejacking
  • D. ARP poisoning
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
[Removed]
Highly Voted 2 years, 7 months ago
Selected Answer: B
coffee shop = public wifi, a deauthentication attack to the target client, disconnecting it from its current network, thus allowing the client to automatically connect to the evil twin access point.
upvoted 28 times
...
gton12
Highly Voted 1 year, 8 months ago
took exam recently, this question was on the test
upvoted 19 times
...
sujon_london
Most Recent 1 year, 8 months ago
Selected Answer: B
Deauthentication Attack and Reconnection: attackers can perform a deauthentication attack to force users to disconnect from a legitimate network. When users’ devices reconnect, they might automatically connect to an evil twin network with a stronger signal, assuming it’s the genuine network.
upvoted 2 times
...
RobbieT
2 years ago
Evil Twin. Deaunthenticate the user to force them over to the evil twin access point.
upvoted 2 times
...
tutita
2 years, 1 month ago
Selected Answer: B
evil twin 100%
upvoted 1 times
...
SophyQueenCR82
2 years, 1 month ago
B- Image result for define deauthentification cybersecurity A deauth or deauthentication attack disrupts connections between users and Wi-Fi access points. The attackers force devices to lose access and then reconnect to a network they control. Then, perpetrators can track connections, capture login details, or trick users into installing rogue programs. Attackers can set up rogue networks or evil twins mimicking legitimate access points so they can monitor victims’ traffic.
upvoted 1 times
SophyQueenCR82
2 years, 1 month ago
Deauthentication is a type of attack in which an attacker sends a forged deauthentication packet to a wireless access point, causing one or more users to be disconnected from the network. This type of attack can be used in combination with an evil twin attack, in which an attacker sets up a rogue wireless access point with the same name as a legitimate access point to trick users into connecting to it. By deauthenticating users on the legitimate access point, the attacker can force them to connect to the rogue access point, allowing the attacker to intercept their network traffic and potentially steal sensitive information.
upvoted 7 times
ApplebeesWaiter1122
1 year, 9 months ago
Great explanation!
upvoted 1 times
...
...
...
JSOG
2 years, 5 months ago
Selected Answer: B
Deauthentication Description This attack sends disassocate packets to one or more clients which are currently associated with a particular access point. Disassociating clients can be done for a number of reasons: Recovering a hidden ESSID. This is an ESSID which is not being broadcast. Another term for this is “cloaked”. Capturing WPA/WPA2 handshakes by forcing clients to reauthenticate Generate ARP requests (Windows clients sometimes flush their ARP cache when disconnected) Of course, this attack is totally useless if there are no associated wireless client or on fake authentications.
upvoted 3 times
...
ankit_1606
2 years, 6 months ago
Selected Answer: B
https://surfshark.com/blog/what-is-evil-twin-attack
upvoted 3 times
NerdAlert
2 years, 1 month ago
oh, this is great! So a common technique for Evil Twin Attacks is to have a fake network with same SSID and authentication, but with a stronger signal, and then try to kick people off the real network with a deauthentication attack DDoS. Now, when they try to reauthenticate their device automatically chooses the fake network because of the stronger signal! Nice! (well, not nice) - this is from step 4 halfway down the article
upvoted 1 times
...
...
Gino_Slim
2 years, 6 months ago
Selected Answer: A
I don't think it's Evil Twin because it doesn't state anything about "two wifi SSIDs with the same name". It just says they are at a coffee shop. What it does state however is that there is lag and etc...which a Session Replay does. Session replay attacks, also known as replay or replay attacks, are network attacks that maliciously “retry” or “delay” valid data transmissions. Hackers can do this by intercepting the session and stealing the user’s unique session ID (stored as either a cookie, URL, or form field). The hacker can now impersonate the authorized user and have full access to do everything the authorized user can do on the website. A replay attack occurs when a cybercriminal intercepts a secure network communication, intercepts it, and fraudulently delays or transmits it to trick the recipient into doing what the attacker is looking for.
upvoted 6 times
Sandon
2 years, 3 months ago
You missed the keyword "deauthentication"
upvoted 6 times
...
yasuke
2 years, 5 months ago
IEEE 802.11 refers to the set of standards that define communication for wireless LANs (wireless local area networks, or WLANs). The technology behind 802.11 is branded to consumers as Wi-Fi.
upvoted 1 times
...
...
comeragh
2 years, 6 months ago
Selected Answer: B
Agreed with B - Evil Twin here.
upvoted 4 times
...
Kashim
2 years, 7 months ago
Selected Answer: A
Only session reply makes sense to me. Evil twin is copy of legimitate SSID (access point). No deauthentication is needed here.
upvoted 4 times
[Removed]
2 years, 6 months ago
I’m almost positive you have to deauth to get them to connect to the evil twin. I do not believe session replay has a deauth needed. Thoughts?
upvoted 3 times
Sandon
2 years, 3 months ago
You're exactly right, it's an evil twin
upvoted 3 times
...
...
...
ksave
2 years, 7 months ago
Selected Answer: B
Deauthentication: Seems Evil Twin to me
upvoted 5 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago