In a(n) __________ situation, a wireless device is configured to appear to be a legitimate access point, enabling the operator to steal passwords from legitimate users and then penetrate a wired network through a legitimate wireless access point.
A. malicious association
B. identiy theft
C. network injection
D. ad hoc network
A. malicious association
Computer Science & Information Technology
You might also like to view...
Which came first?
a. modems b. the first e-mail c. Archie d. Netscape
Computer Science & Information Technology
Worms are a type of malicious software that can spread from one computer to another.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology