In a(n) __________ situation, a wireless device is configured to appear to be a legitimate access point, enabling the operator to steal passwords from legitimate users and then penetrate a wired network through a legitimate wireless access point.

A. malicious association
B. identiy theft
C. network injection
D. ad hoc network

A. malicious association

Computer Science & Information Technology

You might also like to view...

Which came first?

a. modems b. the first e-mail c. Archie d. Netscape

Computer Science & Information Technology

Worms are a type of malicious software that can spread from one computer to another.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology