exam questions

Exam 312-50v12 All Questions

View all questions & answers for the 312-50v12 exam

Exam 312-50v12 topic 1 question 122 discussion

Actual exam question from ECCouncil's 312-50v12
Question #: 122
Topic #: 1
[All 312-50v12 Questions]

Jane invites her friends Alice and John over for a LAN party. Alice and John access Jane’s wireless network without a password. However, Jane has a long, complex password on her router. What attack has likely occurred?

  • A. Wardriving
  • B. Wireless sniffing
  • C. Evil twin
  • D. Piggybacking
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
eli117
Highly Voted 1 year, 12 months ago
Selected Answer: D
D. Piggybacking, which is an unauthorized access to a wireless network where an attacker gains access to the network by connecting to a legitimate user's wireless network without permission. In this scenario, Alice and John were able to access Jane's wireless network without a password, indicating that they piggybacked on her network without her permission. Although Jane has a long and complex password on her router, her guests were still able to access her network without authorization. Wardriving is the act of driving around with a wireless-enabled device looking for wireless access points, wireless sniffing is the practice of intercepting and analyzing wireless network traffic, and Evil twin is a type of wireless network attack where an attacker creates a fake access point that impersonates a legitimate wireless network in order to capture sensitive information.
upvoted 5 times
sringan
1 year, 5 months ago
You are wrong. Evil twin is the answer.
upvoted 2 times
...
...
3936e29
Most Recent 1 week, 1 day ago
Selected Answer: C
Don't listen to eli117. In official study guide term of piggybacking is associated with social engineering and is related to entering the building with the consent of the authorized person. The correct answer here is C - evil twin.
upvoted 1 times
...
Miracleam
5 months, 2 weeks ago
D. In this case, Alice and John connect to Jane's legitimate network, not a fake one. Hence, C could not be a good candidate for answer
upvoted 2 times
...
insaniunt
1 year, 3 months ago
Selected Answer: C
C. Evil twin
upvoted 1 times
...
SailOn
1 year, 7 months ago
Alice and John are not attackers, they are victims of an Evil Twin attack, not the perpetrator of a Piggyback attack.
upvoted 2 times
...
BossTeka
1 year, 8 months ago
The answer is D. Piggybacking.
upvoted 2 times
...
Vincent_Lu
1 year, 9 months ago
Selected Answer: C
C. Evil twin
upvoted 1 times
...
victorfs
1 year, 10 months ago
Selected Answer: C
C. Evil twin
upvoted 1 times
...
jeremy13
1 year, 11 months ago
Selected Answer: C
C. Evil twin Like V11 Q146 CEH Book V12 Module 16 Page 2484 from book : An evil twin is a wireless AP that pretends to be a legitimate AP by imitating its SSID.
upvoted 4 times
...
sausageman
1 year, 11 months ago
Selected Answer: C
C. Evil twin
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago