In order to acquire credentials of a valid user on a public hot-spot network, what attacks may be conducted? Choose the single completely correct answer.
This is a great question! I think I'll start by considering the different attack vectors that could be used, then narrow it down to the single most effective option.
I'm a bit confused by the wording of the question. Does "completely correct answer" mean I should only choose one option, or can I select multiple answers?
Okay, I'm pretty sure the answer is A. Social engineering and eavesdropping seem like the most straightforward way to get valid user credentials on a public hotspot.
Hmm, this seems like a tricky one. I'll need to think carefully about the different types of attacks that could be used to acquire user credentials on a public network.
upvoted 0 times
...
Log in to Pass4Success
Sign in:
Report Comment
Is the comment made by USERNAME spam or abusive?
Commenting
In order to participate in the comments you need to be logged-in.
You can sign-up or
login
Pansy
1 day agoFausto
6 days agoWeldon
12 days agoAntione
17 days agoAlpha
22 days agoStephaine
27 days agoAndra
2 months agoMoon
2 months agoEmmanuel
2 months agoClaudio
2 months agoDaniel
2 months agoJames
2 months agoShawnda
3 months agoTalia
3 months agoJolene
3 months agoCarrol
3 months agoKrystina
3 months agoRossana
3 months agoLing
4 months agoStephanie
4 months agoGlory
4 months agoMajor
4 months agoThea
4 months agoWilliam
5 months agoJolene
5 months ago