Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Eccouncil Exam 212-89 Topic 2 Question 43 Discussion

Actual exam question for Eccouncil's 212-89 exam
Question #: 43
Topic #: 2
[All 212-89 Questions]

Which of the following techniques helps incident handlers to detect man-in-the-middle attack by finding the new APs and trying to connect an already established channel,

even if the spoofed AP consists similar IP and MAC addresses as of the original AP?

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

Lenny
1 months ago
Wait, is this a trick question? I feel like I'm being lured into a man-in-the-middle attack just by thinking about it!
upvoted 0 times
...
Edna
1 months ago
You know, if I had a dollar for every time I had to deal with a man-in-the-middle attack, I'd be a millionaire by now. But hey, at least it keeps us on our toes, right?
upvoted 0 times
...
Rosina
1 months ago
I'm leaning towards option D, access point monitoring. Wouldn't that give us the best visibility into the APs and any potential spoofing attempts?
upvoted 0 times
Louvenia
3 days ago
Yeah, it would definitely help us detect any spoofed APs.
upvoted 0 times
...
Amber
26 days ago
I think access point monitoring is the way to go.
upvoted 0 times
...
...
Brittani
2 months ago
Hmm, network traffic monitoring sounds like a solid choice. It should be able to pick up on any suspicious activity within the established channel.
upvoted 0 times
Emogene
17 days ago
I agree, network traffic monitoring would definitely help in detecting any suspicious activity.
upvoted 0 times
...
Lashaunda
19 days ago
D) Access point monitoring
upvoted 0 times
...
Valene
19 days ago
C) General wireless traffic monitoring
upvoted 0 times
...
Ty
24 days ago
B) Network traffic monitoring
upvoted 0 times
...
Buddy
1 months ago
A) Wireless client monitoring
upvoted 0 times
...
...
Carin
2 months ago
I believe the answer is D) Access point monitoring, as it specifically mentions finding new APs.
upvoted 0 times
...
Ben
2 months ago
I think option C is the way to go. General wireless traffic monitoring seems like the best technique to detect man-in-the-middle attacks by identifying new APs and verifying the connection.
upvoted 0 times
...
Angelyn
2 months ago
I agree with Fatima, because monitoring the wireless clients can help detect any unusual activity.
upvoted 0 times
...
Fatima
2 months ago
I think the answer is A) Wireless client monitoring.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77