New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 CISSP Exam - Topic 3 Question 41 Discussion

Actual exam question for ISC2's CISSP exam
Question #: 41
Topic #: 3
[All CISSP Questions]

Configuring a Wireless Access Point (WAP) with the same Service Set Identifier (SSID) as another WAP in order to have users unknowingly connect is referred to as which of the following?

Show Suggested Answer Hide Answer
Suggested Answer: B

Contribute your Thoughts:

0/2000 characters
Yolande
4 months ago
IP spoofing sounds like a different issue to me.
upvoted 0 times
...
Lili
4 months ago
I thought war driving was something else?
upvoted 0 times
...
Amber
4 months ago
Wait, isn't that just jamming?
upvoted 0 times
...
Mitsue
4 months ago
Totally agree, it's a sneaky tactic!
upvoted 0 times
...
Verdell
5 months ago
That's called MITM, right?
upvoted 0 times
...
Dudley
5 months ago
I feel like jamming is more about disrupting signals, not about connecting users to a fake WAP. This is tricky!
upvoted 0 times
...
Jesus
5 months ago
I remember practicing a question about WAPs and SSIDs, and I think it was about impersonation, which sounds like MITM too.
upvoted 0 times
...
Barrett
5 months ago
I think this is related to MITM attacks, but I'm not entirely sure if that's the right term for this specific scenario.
upvoted 0 times
...
Alease
5 months ago
War driving is about finding networks, right? I don't think that's the answer here, but it sounds familiar.
upvoted 0 times
...
Alfreda
5 months ago
This question seems straightforward, I think I'll go with option A to monitor Incident response against SLA performance.
upvoted 0 times
...
Starr
5 months ago
Hmm, I'm a bit confused on this one. I know the CAE should be involved in the process, but I'm not sure which specific roles they should avoid. I'll have to re-read the guidance carefully to make sure I understand the distinction.
upvoted 0 times
...

Save Cancel