During a test, a security consultant detects a hotspot using the same name as the company’s official access point. The consultant suspects an adversary set it up to capture credentials. Which measure helps reduce the risk that employees use the rogue hotspot?
Use a verification method that requires the access point and the client to confirm each other’s identity
Stop broadcasting the official network name
Create a passphrase with a high number of random characters
Ban suspicious device addresses with a specialized monitoring tool
A process requiring both sides to verify each other is more effective because it confirms the legitimate access point’s identity. Hiding a network name does not prevent a device from ultimately detecting it. MAC addresses can be replicated by attackers. Complex passphrases, while helpful, do not provide a mechanism for the user’s device to confirm that the hotspot is authentic.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is mutual authentication in wireless networks?
Open an interactive chat with Bash
Why doesn't hiding the SSID prevent rogue access point attacks?
Open an interactive chat with Bash
How can attackers spoof MAC addresses to bypass monitoring tools?