The process whereby an attacker can trick a corporate mobile device to connect to an impostor AP is referred to as which of the following?

A. inserting network traffic
B. denial of service
C. hijacking the wireless connection
D. reading data

Answer: C

Computer Science & Information Technology

You might also like to view...

Row and column headings that are set to print on each printed page, do NOT appear on each page in Print Preview

Indicate whether the statement is true or false.

Computer Science & Information Technology

Which of the following authentication methods measure unique human characteristics to confirm identity?

A. Smart cards B. Tokens C. Biometrics D. PINs

Computer Science & Information Technology