Weekly CISSP Practice
Exam Questions
Week 37 - Question 2
Which of the following is NOT a form of Wireless Attack?
A. Rogue Access Point
B. War Driving
C. Packet Sniffing
D. IP Spoofing
Answer: D
Explanation:
A. Rogue Access Point
A Rogue AP is an unauthorized wireless access point connected to a secure corporate network without the knowledge of the IT department.
-
The Mechanism: An employee might bring a cheap home router and plug it into a wall jack to get better Wi-Fi. This creates a "backdoor" into the network that bypasses the company's enterprise-grade security controls.
-
Evil Twin: A malicious version of this is the "Evil Twin," where an attacker sets up a Rogue AP with the exact same SSID as the legitimate network to steal user credentials.
B. War Driving
War Driving is the act of searching for Wi-Fi wireless networks by a person in a moving vehicle, using a laptop or smartphone.
-
The Goal: To map out wireless networks, their signal strengths, and their security protocols (e.g., WEP, WPA2, WPA3).
-
The Risk: Attackers use this to find "low-hanging fruit"—networks that are either unencrypted or use outdated security like WEP that can be cracked in seconds.
C. Packet Sniffing (Wireless)
Wireless packet sniffing involves capturing data packets as they travel through the air.
-
The Vulnerability: Unlike wired networks where you need physical access to a switch, wireless signals are broadcast in all directions.
Anyone within range with a wireless adapter in Monitor Mode can capture these packets. -
The Defense: This is why strong encryption (WPA3) is mandatory; even if an attacker sniffs the packets, they should not be able to read the contents.
D. IP Spoofing
This is the correct answer because it is a Network Layer (Layer 3) attack, not an 802.11-specific attack.
-
Why it's the Answer: IP Spoofing involves modifying the source IP address in an IP packet header to impersonate another system.
This can be done on a wired network, a wireless network, or across the internet. It does not target the wireless medium itself; it targets the way the Internet Protocol (IP) handles addressing.
Podcasts
Check out my weekly podcasts that delve deep into the relevant topics related to each of CISSP domains. In addition, I will go over specific questions and they can be interpreted and answered.
CISSP Cyber Training Academy
Tired of not knowing how to study for the CISSP Exam?
Check out the CISSP Cyber Training Academy to help you on your journey!
CISSP Cyber Training - YouTube
Check out my video collection on YouTube discussing all the details needed to help you pass the CISSP exam.