A security analyst reports a company policy violation in a case in which a large amount of sensitive data is
being downloaded after hours from various mobile devices to an external site. Upon further investigation, the
analyst notices that successful login attempts are being conducted with impossible travel times during the same
time periods when the unauthorized downloads are occurring. The analyst also discovers a couple of WAPs are
using the same SSID, but they have non-standard DHCP configurations and an overlapping channel. Which of
the following attacks is being conducted?
A. Evil twin
B. Jamming
C. DNS poisoning
D. Bluesnarfing
E. DDoS
being downloaded after hours from various mobile devices to an external site. Upon further investigation, the
analyst notices that successful login attempts are being conducted with impossible travel times during the same
time periods when the unauthorized downloads are occurring. The analyst also discovers a couple of WAPs are
using the same SSID, but they have non-standard DHCP configurations and an overlapping channel. Which of
the following attacks is being conducted?
A. Evil twin
B. Jamming
C. DNS poisoning
D. Bluesnarfing
E. DDoS