The process whereby an attacker can trick a corporate mobile device to connect to an impostor AP is referred to as which of the following?
A. inserting network traffic
B. denial of service
C. hijacking the wireless connection
D. reading data
Answer: C
Computer Science & Information Technology
You might also like to view...
Row and column headings that are set to print on each printed page, do NOT appear on each page in Print Preview
Indicate whether the statement is true or false.
Computer Science & Information Technology
Which of the following authentication methods measure unique human characteristics to confirm identity?
A. Smart cards B. Tokens C. Biometrics D. PINs
Computer Science & Information Technology