mediummultiple choiceObjective-mapped

During a conference, several employees connect to a wireless network named the same as the hotel's guest Wi-Fi. Shortly after connecting, they receive certificate warnings when accessing the company portal, and packet capture shows a nearby laptop advertising the same SSID and relaying traffic. What type of attack is most likely?

Question 1mediummultiple choice
Full question →

During a conference, several employees connect to a wireless network named the same as the hotel's guest Wi-Fi. Shortly after connecting, they receive certificate warnings when accessing the company portal, and packet capture shows a nearby laptop advertising the same SSID and relaying traffic. What type of attack is most likely?

Answer choices

Why each option matters

Good practice is not just finding the correct option. The wrong answers often show the exact trap the exam wants you to fall into.

A

Best answer

Rogue access point or evil twin attack, because a fake wireless network impersonates a legitimate one.

An evil twin duplicates the SSID of a trusted network to lure clients into connecting to an attacker-controlled access point.

B

Distractor review

Replay attack, because previously captured wireless frames are being resent to the network.

Replay attacks involve retransmitting valid traffic, but the key symptom here is a malicious access point mimicking the legitimate network name.

C

Distractor review

DNS poisoning, because users are being sent to the wrong website through altered name resolution.

DNS poisoning affects name-to-address resolution, but the initial compromise described is a counterfeit Wi-Fi network, not poisoned DNS answers.

D

Distractor review

Denial of service, because users are simply unable to connect reliably.

Users may have connectivity issues, but the observed goal is interception and credential capture rather than making the service unavailable.

Common exam trap

Common exam trap: usable hosts are not the same as total addresses

Subnetting questions often tempt you into counting all addresses. In normal IPv4 subnets, the network and broadcast addresses are not usable host addresses.

Technical deep dive

How to think about this question

Subnetting questions test whether you can identify the network, broadcast address, usable range, mask and correct subnet. Slow down enough to calculate the block size correctly.

KKey Concepts to Remember

  • CIDR notation defines the prefix length.
  • Block size helps identify subnet boundaries.
  • Network and broadcast addresses are not usable hosts in normal IPv4 subnets.
  • The required host count determines the smallest suitable subnet.

TExam Day Tips

  • Write the block size before choosing the subnet.
  • Check whether the question asks for hosts, subnets or a specific address range.
  • Do not confuse /24, /25, /26 and /27 host counts.

Related practice questions

Related SY0-701 practice-question pages

Use these pages to review the topic behind this question. This is how one missed question becomes focused revision.

More questions from this exam

Keep practising from the same exam bank, or move into a focused topic page if this question exposed a weak area.

FAQ

Questions learners often ask

What does this SY0-701 question test?

CIDR notation defines the prefix length.

What is the correct answer to this question?

The correct answer is: Rogue access point or evil twin attack, because a fake wireless network impersonates a legitimate one. — The best match is a rogue access point, often called an evil twin. The attacker copies the trusted Wi-Fi network name so users connect without noticing. Once connected, the attacker can intercept traffic, trigger certificate warnings, and capture credentials. The nearby laptop broadcasting the same SSID is the key clue that the network itself is counterfeit. Why others are wrong: Replay attacks resend captured valid traffic and do not depend on faking the wireless network name. DNS poisoning alters DNS responses, which is not the primary issue in the scenario. Denial of service focuses on availability and disruption, while this attack is aimed at interception and impersonation.

What should I do if I get this SY0-701 question wrong?

Then try more questions from the same exam bank and focus on understanding why the wrong options are tempting.

Discussion

Loading comments…

Sign in to join the discussion.