Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Eccouncil Exam 212-89 Topic 2 Question 43 Discussion

Actual exam question for Eccouncil's 212-89 exam
Question #: 43
Topic #: 2
[All 212-89 Questions]

Which of the following techniques helps incident handlers to detect man-in-the-middle attack by finding the new APs and trying to connect an already established channel,

even if the spoofed AP consists similar IP and MAC addresses as of the original AP?

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

Lenny
24 days ago
Wait, is this a trick question? I feel like I'm being lured into a man-in-the-middle attack just by thinking about it!
upvoted 0 times
...
Edna
26 days ago
You know, if I had a dollar for every time I had to deal with a man-in-the-middle attack, I'd be a millionaire by now. But hey, at least it keeps us on our toes, right?
upvoted 0 times
...
Rosina
30 days ago
I'm leaning towards option D, access point monitoring. Wouldn't that give us the best visibility into the APs and any potential spoofing attempts?
upvoted 0 times
Amber
17 days ago
I think access point monitoring is the way to go.
upvoted 0 times
...
...
Brittani
2 months ago
Hmm, network traffic monitoring sounds like a solid choice. It should be able to pick up on any suspicious activity within the established channel.
upvoted 0 times
Emogene
9 days ago
I agree, network traffic monitoring would definitely help in detecting any suspicious activity.
upvoted 0 times
...
Lashaunda
10 days ago
D) Access point monitoring
upvoted 0 times
...
Valene
11 days ago
C) General wireless traffic monitoring
upvoted 0 times
...
Ty
15 days ago
B) Network traffic monitoring
upvoted 0 times
...
Buddy
28 days ago
A) Wireless client monitoring
upvoted 0 times
...
...
Carin
2 months ago
I believe the answer is D) Access point monitoring, as it specifically mentions finding new APs.
upvoted 0 times
...
Ben
2 months ago
I think option C is the way to go. General wireless traffic monitoring seems like the best technique to detect man-in-the-middle attacks by identifying new APs and verifying the connection.
upvoted 0 times
...
Angelyn
2 months ago
I agree with Fatima, because monitoring the wireless clients can help detect any unusual activity.
upvoted 0 times
...
Fatima
2 months ago
I think the answer is A) Wireless client monitoring.
upvoted 0 times
...

Save Cancel