An attacker Joe configures his service identifier to be the same as an access point advertised on a billboard. Joe then conducts a denial of service attack against the legitimate AP causing users to drop their connections and then reconnect to Joe's system with the same SSID. Which of the following Best describes this type of attack?
A. Bluejacking
B. WPS attack
C. Evil twin
D. War driving
E. Relay attack
Answer: C. Evil twin
Computer Science & Information Technology
You might also like to view...
A dynamic stack has a __________ size and is implemented as a(n) __________.
a. variable, linked list b. fixed, linked list c. variable, array d. fixed, array e. None of these
Computer Science & Information Technology
All of these facts describe time-sharing systems EXCEPT ____.
A. Were developed in the late 1980s B. Allowed several programs to run concurrently on a single computer C. Users logged in to the computer via a remote terminal. D. Still used today in the form of Web and e-mail servers
Computer Science & Information Technology