An attacker Joe configures his service identifier to be the same as an access point advertised on a billboard. Joe then conducts a denial of service attack against the legitimate AP causing users to drop their connections and then reconnect to Joe's system with the same SSID. Which of the following Best describes this type of attack?

A. Bluejacking
B. WPS attack
C. Evil twin
D. War driving
E. Relay attack

Answer: C. Evil twin

Computer Science & Information Technology

You might also like to view...

A dynamic stack has a __________ size and is implemented as a(n) __________.

a. variable, linked list b. fixed, linked list c. variable, array d. fixed, array e. None of these

Computer Science & Information Technology

All of these facts describe time-sharing systems EXCEPT ____.

A. Were developed in the late 1980s B. Allowed several programs to run concurrently on a single computer C. Users logged in to the computer via a remote terminal. D. Still used today in the form of  Web and e-mail servers

Computer Science & Information Technology