exam questions

Exam 312-50v11 All Questions

View all questions & answers for the 312-50v11 exam

Exam 312-50v11 topic 1 question 215 discussion

Actual exam question from ECCouncil's 312-50v11
Question #: 215
Topic #: 1
[All 312-50v11 Questions]

Bobby, an attacker, targeted a user and decided to hijack and intercept all their wireless communications. He installed a fake communication tower between two authentic endpoints to mislead the victim. Bobby used this virtual tower to interrupt the data transmission between the user and real tower, attempting to hijack an active session. Upon receiving the user's request, Bobby manipulated the traffic with the virtual tower and redirected the victim to a malicious website.
What is the attack performed by Bobby in the above scenario?

  • A. aLTEr attack
  • B. Jamming signal attack
  • C. Wardriving
  • D. KRACK attack
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
cerzocuspi
Highly Voted 2 years ago
aLTEr attacks are usually performed on LTE devices Attacker installs a virtual (fake) communication tower between two authentic endpoints intending to mislead the victim This virtual tower is used to interrupt the data transmission between the user and real tower attempting to hijack the active session.
upvoted 16 times
...
Scryptic
Highly Voted 1 year, 8 months ago
You may have heard of Stingray towers. Here is an example: Stingrays have been used on the ground and in the air by law enforcement for years but are highly controversial because they don’t just collect data from targeted phones; they collect data from any phone in the vicinity of a device. That data can be used to identify people — protesters, for example — and track their movements during and after demonstrations, as well as to identify others who associate with them. They also can inject spying software onto specific phones or direct the browser of a phone to a website where malware can be loaded onto it, though it’s not clear if any U.S. law enforcement agencies have used them for this purpose.
upvoted 6 times
...
Daniel8660
Most Recent 6 months, 3 weeks ago
Selected Answer: A
aLTEr Attack Attacker installs a virtual (fake) communication tower between two authentic endpoints intending to mislead the victim.This virtual tower is used to interrupt the data transmission between the user and real tower attempting to hijack the active session. (P.2240/2224)
upvoted 3 times
...
strale
10 months, 3 weeks ago
Selected Answer: A
A is correct
upvoted 1 times
...
ANDRESCB1988
1 year, 9 months ago
correct
upvoted 1 times
...
trfab
1 year, 9 months ago
Correct
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago