Which of the following attack vectors was MOST likely used in this scenario?

Posted by: Pdfprep Category: SY0-601 Tags: , ,

A user contacts the help desk to report the following:

– Two days ago, a pop-up browser window prompted the user for a name and password after connecting to the corporate wireless SSID. This had never happened before, but the user entered the information as requested.

– The user was able to access the Internet but had trouble accessing the department share until the next day.

– The user is now getting notifications from the bank about unauthorized transactions.

Which of the following attack vectors was MOST likely used in this scenario?
A . Rogue access point
B . Evil twin
C . DNS poisoning
D . ARP poisoning

Answer: A

Leave a Reply

Your email address will not be published.