header bg

Scan QR code or get instant email to install app

Question:

You are responsible for network security at Acme Company. Users have been complaining that personal data is being stolen when using the wireless network. They all insist they only connect to the corporate wireless access point (AP). However, logs for the AP show that these users have not connected to it. Which of the following would BEST explain this situation?

A Rogue access point.
explanation

If users have been connecting but the AP does not show them connecting, then they have been connecting to a rogue access point. This could be the trigger of an architecture and design weakness such as a network without segmentation and control of devices connecting to the network. Session hijacking involves taking over an already authenticated session. Most session hijacking attacks involve impersonation. The attacker attempts to gain access to another user’s session by posing as that user. Clickjacking involves causing visitors to a website to click on the wrong item. Finally, bluejacking is a Bluetooth attack.

Related Information

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *

*