exam questions

Exam N10-008 All Questions

View all questions & answers for the N10-008 exam

Exam N10-008 topic 1 question 394 discussion

Actual exam question from CompTIA's N10-008
Question #: 394
Topic #: 1
[All N10-008 Questions]

A network security engineer locates an unapproved wireless bridge connected to the corporate LAN that is broadcasting a hidden SSID, providing unauthenticated access to internal resources. Which of the following types of attacks BEST describes this finding?

  • A. Rogue access point
  • B. Evil twin
  • C. ARP spoofing
  • D. VLAN hopping
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
marmarhar1980
Highly Voted 1 year, 12 months ago
Selected Answer: A
A rogue access point is an illegitimate access point plugged into a network to create a bypass from outside into the legitimate network. By contrast, an evil twin is a copy of a legitimate access point.
upvoted 14 times
...
[Removed]
Highly Voted 1 year, 11 months ago
Selected Answer: A
A rogue is hidden. Its a ROGUE. An evil TWIN is a copy of another Access Point.
upvoted 10 times
...
Dima1993
Most Recent 8 months ago
Mehsotopes is a troll
upvoted 4 times
...
Mehsotopes
11 months, 2 weeks ago
Selected Answer: B
The connection is connected as a bridge that is allowed to disguise itself as the access point to the internal network. If it was a separate connection in apart from the other wireless access point it would be a rogue access point. Because connection bridged itself in (centered), it is acting as an evil twin, not a rogue access point to gather data & take control of the people connecting, & the internal network.
upvoted 1 times
...
Mehsotopes
11 months, 2 weeks ago
Selected Answer: A
The connection is connected as a bridge that is allowed to disguise itself as the access point to the internal network. If it was a separate connection in apart from the other wireless access point it would be a rogue access point. Because connection bridged itself in (centered), it is acting as an evil twin, not a rogue access point to gather data & take control of the people connecting, & the internal network.
upvoted 1 times
Mehsotopes
11 months, 2 weeks ago
Meant B.
upvoted 1 times
...
...
jeanj
1 year ago
evil twin doesnt have access to the network, it a copy to trick you into thinking its a normal AP so it can steal YOUR DATA, a hacker whos already in most likely doesnt need your data if they are in the main objactive
upvoted 2 times
...
Cherubael
1 year, 1 month ago
Selected Answer: A
Can't be B cause nowhere does it mention having the same SSID of legitimate APs.
upvoted 1 times
...
Juliana1017
1 year, 3 months ago
Selected Answer: A
it is A, it is not evil twin
upvoted 1 times
...
famco
1 year, 6 months ago
Different SSID is rogue access point. Evil twin is same SSID. Rogue access point is lack of user awareness mostly
upvoted 1 times
famco
1 year, 6 months ago
But rogue access point can also be used to steal information
upvoted 1 times
...
...
Doaa81
1 year, 7 months ago
Selected Answer: A
A. Rogue access point.
upvoted 1 times
...
67eleanor
1 year, 7 months ago
Selected Answer: A
The answer is A. Its hidden and not duplicating anything
upvoted 1 times
...
Eumousten
1 year, 7 months ago
Selected Answer: A
Rogue Access Points and Evil Twins - SY0-601 CompTIA Security+ : 1.4 Professor Messer https://m.youtube.com/watch?v=fdoHB08VZQU
upvoted 2 times
...
StellarSteve
1 year, 7 months ago
Its A. for sure
upvoted 1 times
...
Cannnon
1 year, 8 months ago
B is correct correct is B
upvoted 1 times
swiggharo
1 year, 7 months ago
why is that?
upvoted 1 times
...
...
BeauChateau
1 year, 9 months ago
Selected Answer: A
A. Rogue access point A rogue access point is an unauthorised wireless access point that has been connected to a network without the knowledge of the network administrator. This rogue access point may be connected to the LAN, and it may be broadcasting a hidden SSID, providing unauthenticated access to internal resources. This is a security risk, as it can allow an attacker to gain access to the corporate network and steal sensitive data. An evil twin is a type of rogue access point that is used to impersonate a legitimate wireless network in order to steal credentials from unsuspecting users. ARP spoofing is a type of attack where an attacker alters the ARP cache of a device, allowing them to intercept network traffic. VLAN hopping is a technique used to gain unauthorized access to other VLANs on a network.
upvoted 1 times
...
pedrwc7
1 year, 9 months ago
Selected Answer: A
A. Rogue access point - An unathorized network device that is plugged to a private network B. Evil twin - WAP C. ARP spoofing - N/A D. VLAN hopping - N/A
upvoted 1 times
...
MollyTheCat
1 year, 10 months ago
Selected Answer: A
It is A, because an evil twin would "imitate" a company WAP. So it would use the company SSID to gather user credentials. Here the rogue AP is broadcasting a hidden SSID to gain access to company ressources.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago