<< Prev Question Next Question >>

Question 25/56

Given: John Smith uses a coffee shop's Internet hot-spot (no authentication or encryption) to transfer funds between his checking and savings accounts at his bank's website. The bank's website uses the HTTPS protocol to protect sensitive account information. While John was using the hot-spot, a hacker was able to obtain John's bank account user ID and password and exploit this information.
What likely scenario could have allowed the hacker to obtain John's bank account user ID and password?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (56q)
Question 1: In the basic 4-way handshake used in secure 802.11 networks,...
Question 2: When monitoring APs within a LAN using a Wireless Network Ma...
Question 3: Joe's new laptop is experiencing difficulty connecting to AB...
Question 4: The IEEE 802.11 standard defined Open System authentication ...
Question 5: What security benefits are provided by endpoint security sol...
Question 6: What wireless security protocol provides mutual authenticati...
Question 7: Which one of the following describes the correct hierarchy o...
Question 8: Given: During 802.1X/LEAP authentication, the username is pa...
Question 9: Given: You are installing 6 APs on the outside of your facil...
Question 10: As the primary security engineer for a large corporate netwo...
Question 11: Given: Many computer users connect to the Internet at airpor...
Question 12: Which of the following security attacks cannot be detected b...
Question 13: Given: ABC Company has a WLAN controller using WPA2-Enterpri...
Question 14: Select the answer option that arranges the numbered events i...
Question 15: Given: You support a coffee shop and have recently installed...
Question 16: Given: Your network includes a controller-based WLAN archite...
Question 17: Given: XYZ Company has recently installed a controller-based...
Question 18: Given: An 802.1X/EAP implementation includes an Active Direc...
Question 19: Given: XYZ Hospital plans to improve the security and perfor...
Question 20: Given: You have a Windows laptop computer with an integrated...
Question 21: Given: A large enterprise is designing a secure, scalable, a...
Question 22: What security vulnerabilities may result from a lack of stag...
Question 23: Given: ABC Company is an Internet Service Provider with thou...
Question 24: You must locate non-compliant 802.11 devices. Which one of t...
Question 25: Given: John Smith uses a coffee shop's Internet hot-spot (no...
Question 26: You are using a utility that takes input and generates rando...
Question 27: In an effort to optimize WLAN performance, ABC Company has u...
Question 28: Given: You are the WLAN administrator in your organization a...
Question 29: What drawbacks initially prevented the widespread acceptance...
Question 30: ABC Company has deployed a Single Channel Architecture (SCA)...
Question 31: For a WIPS system to identify the location of a rogue WLAN d...
Question 32: When used as part of a WLAN authentication solution, what is...
Question 33: You are configuring seven APs to prevent common security att...
Question 34: The following numbered items show some of the contents of ea...
Question 35: What type of WLAN attack is prevented with the use of a per-...
Question 36: Given: In XYZ's small business, two autonomous 802.11ac APs ...
Question 37: Given: You must implement 7 APs for a branch office location...
Question 38: Given: WLAN protocol analyzers can read and record many wire...
Question 39: What software and hardware tools are used together to hijack...
Question 40: What are the three roles of the 802.1X framework, as defined...
Question 41: Given: In a security penetration exercise, a WLAN consultant...
Question 42: Given: A WLAN protocol analyzer trace reveals the following ...
Question 43: You have been recently hired as the wireless network adminis...
Question 44: A single AP is configured with three separate WLAN profiles,...
Question 45: Given: A WLAN consultant has just finished installing a WLAN...
Question 46: While seeking the source of interference on channel 11 in yo...
Question 47: What statement is true regarding the nonces (ANonce and SNon...
Question 48: You are implementing an 802.11ac WLAN and a WIPS at the same...
Question 49: When using the 802.1X/EAP framework for authentication in 80...
Question 50: When implementing a WPA2-Enterprise security solution, what ...
Question 51: ABC Company uses the wireless network for highly sensitive n...
Question 52: Given: ABC Company has recently installed a WLAN controller ...
Question 53: Which one of the following is a valid reason to avoid the us...
Question 54: What preventative measures are performed by a WIPS against i...
Question 55: What statement accurately describes the functionality of the...
Question 56: What is a primary criteria for a network to qualify as a Rob...