A security analyst is investigating a user's complaint that their wireless connection keeps disconnecting. The analyst uses a wireless scanning tool and discovers two access points broadcasting the same SSID 'CorpNet' with different BSSIDs. One is the legitimate company AP on channel 1, and the other is on channel 11 with a strong signal and security set to 'Open'. Which of the following attacks is most likely occurring?
Answer choices
Why each option matters
Good practice is not just finding the correct option. The wrong answers often show the exact trap the exam wants you to fall into.
Distractor review
War driving
War driving is the act of mapping wireless access points, not actively attacking users by impersonating an AP.
Distractor review
Rogue access point
While a rogue AP is an unauthorized AP, the scenario specifically describes an AP that is spoofing the legitimate SSID with open security, which is an evil twin attack. 'Evil twin' is more precise.
Best answer
Evil twin
The presence of two APs with the same SSID, one with strong signal and open security, strongly indicates an evil twin attack designed to capture credentials and traffic.
Distractor review
Bluesnarfing
Bluesnarfing is an attack on Bluetooth devices, not on Wi-Fi networks.
Common exam trap
Common exam trap: usable hosts are not the same as total addresses
Subnetting questions often tempt you into counting all addresses. In normal IPv4 subnets, the network and broadcast addresses are not usable host addresses.
Technical deep dive
How to think about this question
Subnetting questions test whether you can identify the network, broadcast address, usable range, mask and correct subnet. Slow down enough to calculate the block size correctly.
KKey Concepts to Remember
- CIDR notation defines the prefix length.
- Block size helps identify subnet boundaries.
- Network and broadcast addresses are not usable hosts in normal IPv4 subnets.
- The required host count determines the smallest suitable subnet.
TExam Day Tips
- Write the block size before choosing the subnet.
- Check whether the question asks for hosts, subnets or a specific address range.
- Do not confuse /24, /25, /26 and /27 host counts.
Related practice questions
Related N10-009 practice-question pages
Use these pages to review the topic behind this question. This is how one missed question becomes focused revision.
Network+ network fundamentals practice questions
Practise N10-009 questions linked to Network+ network fundamentals.
Network+ implementation practice questions
Practise N10-009 questions linked to Network+ implementation.
Network+ operations practice questions
Practise N10-009 questions linked to Network+ operations.
Network+ security practice questions
Practise N10-009 questions linked to Network+ security.
Network+ troubleshooting practice questions
Practise N10-009 questions linked to Network+ troubleshooting.
More questions from this exam
Keep practising from the same exam bank, or move into a focused topic page if this question exposed a weak area.
Question 1
A network engineer needs to connect two switches located 400 meters apart. The cable run includes high electromagnetic interference from nearby machinery. The engineer decides to use fiber optic cabling. Which transceiver type and fiber combination should be used to ensure the link reaches 400 meters while remaining cost-effective?
Question 2
A network engineer is designing a new switched network and needs to ensure that broadcast traffic from one department does not reach another department's workstations. The engineer plans to use VLANs. Which of the following must be configured on the switches to isolate broadcast domains as intended?
Question 3
A security engineer is configuring a site-to-site VPN between two branch offices. The requirement is to encrypt all traffic between the two networks using IPsec. Which IPsec mode should be used to encrypt the entire IP packet including the original header?
Question 4
A network administrator is connecting two switches to increase bandwidth and provide redundancy. Which technology should be used to combine multiple physical links into a single logical link?
Question 5
A network administrator is experiencing issues where unauthorized devices are offering IP addresses to clients, causing connectivity problems. Which security feature should be enabled on switches to prevent this?
Question 6
A network administrator is troubleshooting a connectivity issue and suspects the problem is related to the physical cabling. At which layer of the OSI model should the administrator begin their investigation?
FAQ
Questions learners often ask
What does this N10-009 question test?
CIDR notation defines the prefix length.
What is the correct answer to this question?
The correct answer is: Evil twin — An evil twin attack involves a malicious access point that impersonates a legitimate AP by using the same SSID. The rogue AP is set up to trick users into connecting, often with an open security configuration to intercept traffic. The presence of two APs with the same SSID but different security settings (one open, one secure) is a classic sign of an evil twin. A rogue AP (B) is any unauthorized AP, but the term 'evil twin' specifically describes a spoofed AP that mimics a legitimate one. War driving (A) is the act of searching for wireless networks, and bluesnarfing (D) involves Bluetooth.
What should I do if I get this N10-009 question wrong?
Then try more questions from the same exam bank and focus on understanding why the wrong options are tempting.
Discussion
Sign in to join the discussion.