exam questions

Exam 312-50v12 All Questions

View all questions & answers for the 312-50v12 exam

Exam 312-50v12 topic 1 question 22 discussion

Actual exam question from ECCouncil's 312-50v12
Question #: 22
Topic #: 1
[All 312-50v12 Questions]

Bobby, an attacker, targeted a user and decided to hijack and intercept all their wireless communications. He installed a fake communication tower between two authentic endpoints to mislead the victim. Bobby used this virtual tower to interrupt the data transmission between the user and real tower, attempting to hijack an active session. Upon receiving the user’s request, Bobby manipulated the traffic with the virtual tower and redirected the victim to a malicious website.
What is the attack performed by Bobby in the above scenario?

  • A. aLTEr attack
  • B. Jamming signal attack
  • C. Wardriving
  • D. KRACK attack
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
jeremy13
Highly Voted 1 year, 6 months ago
Selected Answer: A
A. aLTEr Attack BOOK V12 Module 16 P2425 The aLTEr attack is usually performed on LTE devices that encrypt user data in the AES counter (AES-CTR) mode, which provides no integrity protection. To perform this attack, the attacker installs a virtual (fake) communication tower between two authentic endpoints to mislead the victim. The attacker uses this virtual tower to interrupt the data transmission between the user and real tower, attempting to hijack an active session. Upon receiving the user’s request, the attacker manipulates the traffic with the virtual tower and redirects the victim to malicious websites.
upvoted 12 times
I_Know_Everything_KY
8 months, 1 week ago
"Usually". LOL.
upvoted 2 times
...
...
eli117
Highly Voted 1 year, 6 months ago
Selected Answer: A
A. aLTEr attack. Bobby installed a fake communication tower between two authentic endpoints to intercept and hijack all the wireless communications of a user. This is an example of an aLTEr (Advanced LTE Recovery) attack, also known as an IMSI (International Mobile Subscriber Identity) catcher or a fake cell tower attack. In this attack, the attacker sets up a rogue base station that mimics a legitimate cell tower to trick mobile devices into connecting to it. Once connected, the attacker can intercept, monitor, and manipulate the traffic between the device and the legitimate cell tower.
upvoted 5 times
...
Mann098
Most Recent 3 months, 3 weeks ago
Selected Answer: A
aLTEr attack
upvoted 1 times
...
I_Know_Everything_KY
8 months, 1 week ago
Answer is A, but this is a purely theoretical attack with near-zero chance of being pulled off. HSTS makes it 100% impossible. Why EC-Council insists on glorifying threat-p0rn is beyond me.
upvoted 4 times
qtygbapjpesdayazko
8 months, 1 week ago
Its A, and you are right.
upvoted 2 times
...
...
insaniunt
11 months ago
A. aLTEr attack
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago