exam questions

Exam 220-1102 All Questions

View all questions & answers for the 220-1102 exam

Exam 220-1102 topic 1 question 139 discussion

Actual exam question from CompTIA's 220-1102
Question #: 139
Topic #: 1
[All 220-1102 Questions]

A user connected a laptop to a wireless network and was tricked into providing log-in credentials for a website. Which of the following threats was used to carry out the attack?

  • A. Zero day
  • B. Vishing
  • C. DDoS
  • D. Evil twin
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
DerekM
Highly Voted 1 year, 12 months ago
Selected Answer: D
An Evil Twin attack is a type of wireless network attack where an attacker sets up a rogue wireless access point (AP) that mimics a legitimate one. The attacker's goal is to intercept wireless traffic from legitimate users who connect to the rogue AP, steal sensitive information such as login credentials, financial information, or other confidential data, and potentially conduct other malicious activities. The Evil Twin attack can be carried out using several methods, including using social engineering techniques to trick users into connecting to the rogue AP or using tools to deauthenticate users from the legitimate AP to force them to connect to the rogue one.
upvoted 13 times
...
ted19
Most Recent 9 months, 1 week ago
Selected Answer: D
Evil Twin
upvoted 1 times
...
Footieprogrammer
1 year, 8 months ago
Selected Answer: D
Evil twin attack
upvoted 1 times
...
Neldave027
2 years ago
B is the correct answer
upvoted 1 times
bleufee
1 year, 10 months ago
vishing is by phone
upvoted 1 times
TonxhiPatonxhi
1 year, 9 months ago
that guy and more like him recently on the dumps gets the answers from ChatGPT without even thinking for themselves...even ChatGPT needs to be corrected or challenged into thinking
upvoted 6 times
...
...
...
ScorpionNet
2 years ago
Selected Answer: D
D is correct because Evil Twin aka WAP spoofing is a wireless related attack where the attacker makes a fake access point to steal information from the victim.
upvoted 3 times
...
Dido1963
2 years, 4 months ago
https://www.pandasecurity.com/en/mediacenter/security/what-is-an-evil-twin-attack/
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago