What is the term given to a rogue access point in which they serve as a man in the middle from which further attacks can be carried out?
a. Evil twin
b. War twinning
c. Twin driving
d. War driving
Answer: a. Evil twin
Computer Science & Information Technology
You might also like to view...
An array's ____ method returns an integer that indicates the highest subscript in the specified dimension in the array.
A. Sort B. Reverse C. TryParse D. GetUpperBound
Computer Science & Information Technology
____ specifies formatting and placement.
A. CSS B. XML C. DHTML D. XHTML
Computer Science & Information Technology