In which of the following attacks does an attacker install a fake communication tower between two authentic endpoints with the intention of misleading a user and interrupting the data transmission between the user and real tower to hijack an active session?
A. Rogue AP attack
B. Key reinstallation attack
C. Wardriving
D. aLTEr attack
Answer: D. aLTEr attack
You might also like to view...
After collecting all of the relevant evidence, investigators analyze the data in order to establish the ____.
A. concomitant events B. congruent events C. concurrent events D. constituent events
This function returns:
```
1 bool search( Node