Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam 312-50v11 All Questions

View all questions & answers for the 312-50v11 exam

Exam 312-50v11 topic 1 question 340 discussion

Actual exam question from ECCouncil's 312-50v11
Question #: 340
Topic #: 1
[All 312-50v11 Questions]

An attacker identified that a user and an access point are both compatible with WPA2 and WPA3 encryption. The attacker installed a rogue access point with only
WPA2 compatibility in the vicinity and forced the victim to go through the WPA2 four-way handshake to get connected. After the connection was established, the attacker used automated tools to crack WPA2-encrypted messages.
What is the attack performed in the above scenario?

  • A. Cache-based attack
  • B. Timing-based attack
  • C. Downgrade security attack
  • D. Side-channel attack
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
Scryptic
Highly Voted 3 years, 1 month ago
Module 16 Page 2306 CEH Training v11: Downgrade Security Attacks To launch this attack, the client and AP should support both WPA3 and WPA2 encryption mechanisms. Here, the attacker forces the user to follow the older encryption method, WPA2, to connect to the network. Here is one way to implement a downgrade security attack: Exploiting backward compatibility: If a user and AP are compatible with both WPA2 and WPA3 encryption mechanisms, then the attacker installs a rogue AP with only WPA2 compatibility in the vicinity and forces the client to go through the four-way handshake (WPA2) to get connected. Once the connection is established, the attacker uses all the attack tools available to exploit or crack the WPA2 encryption.
upvoted 27 times
KumaraRashu
2 years, 9 months ago
Correct:It is downgrade based on CEHv11
upvoted 1 times
...
Gerasz87
2 years, 7 months ago
In the online version of the book at page 2322, but you are right.
upvoted 1 times
...
...
serenityy
Highly Voted 3 years, 1 month ago
Downgrade security attack
upvoted 8 times
...
sunce12
Most Recent 5 months, 1 week ago
Downgrade security attack
upvoted 1 times
...
steffBarj
1 year, 4 months ago
Side Channel Attack --> D
upvoted 1 times
...
Daniel8660
2 years, 1 month ago
Selected Answer: C
WPA3 Encryption Cracking Downgrade Security Attacks - The client and AP compatiable with both WPA3 and WPA2 encryption mechanisms. Then the attacker installs a rogue AP with only WPA2 compatibility in the vicinity and forces the client to go through the four-way handshake (WPA2) to get connected. Once the connection is established, the attacker uses all the attack tools available to exploit or crack the WPA2 encryption. (P.2322/2306)
upvoted 2 times
...
VinciTheTechnic1an
2 years, 6 months ago
Selected Answer: C
C is the closest answer.
upvoted 1 times
...
Newbiii
2 years, 9 months ago
Selected Answer: D
As it is mentioned in the question that-"An attacker identified that a user and an access point are both compatible with WPA2 and WPA3 encryption",the attacker uses this knowledge for attack.SO this is Side channel attack.
upvoted 1 times
logibotus
2 years, 6 months ago
In the tv series Deutschland 83 season 1 ep 3 the spy plants a microphone under the secretary's desk and asks her to type the text of a song, the bug under the desk transmits the sound of the keystrokes and the letters are identified because of the control text (the song) after that trough the sound of the typewriter the spies are able to reconstruct what she is typing. This is an example of a side-channel attack. The question on hand is a downgrade attack. "C" is the right answer.
upvoted 5 times
...
...
thaidv8xx
2 years, 10 months ago
i THINK c
upvoted 1 times
...
TheDark
2 years, 10 months ago
Selected Answer: C
C - it is downgrade attack
upvoted 1 times
...
AjaxFar
2 years, 10 months ago
C is the correct answer, the rest are all side channel attack. But why examtopics is making this kind of mistake we expect accurate answer from this platform
upvoted 1 times
...
LucyChang
2 years, 10 months ago
answer is C
upvoted 1 times
...
RoVasq3
2 years, 11 months ago
C is the answer
upvoted 1 times
...
ProveCert
2 years, 11 months ago
Selected Answer: C
C is the answer
upvoted 3 times
...
Bot001
3 years ago
timing based attack is the answer
upvoted 1 times
...
[Removed]
3 years, 1 month ago
Answer is C.
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...