An attacker unplugs the access point at a coffee shop. The attacker then runs software to make a laptop look like an access point and advertises the same network as the coffee shop normally does. Which of the following describes this type of attack?
A. IV
B. Xmas
C. Packet sniffing
D. Evil twin
E. Rouge AP
Answer: D. Evil twin
Computer Science & Information Technology
You might also like to view...
Which of the following can be defined as the loss of value in dollars based on a single incident?
A. SLE B. ARO C. ALE D. MAC
Computer Science & Information Technology
Which option below is the default teaming mode within Windows Server 2016?
A. Switch Independent B. Hyper-V Port C. Static D. LACP
Computer Science & Information Technology