An attacker unplugs the access point at a coffee shop. The attacker then runs software to make a laptop look like an access point and advertises the same network as the coffee shop normally does. Which of the following describes this type of attack?

A. IV
B. Xmas
C. Packet sniffing
D. Evil twin
E. Rouge AP

Answer: D. Evil twin

Computer Science & Information Technology

You might also like to view...

Which of the following can be defined as the loss of value in dollars based on a single incident?

A. SLE B. ARO C. ALE D. MAC

Computer Science & Information Technology

Which option below is the default teaming mode within Windows Server 2016?

A. Switch Independent B. Hyper-V Port C. Static D. LACP

Computer Science & Information Technology