What is the term given to a rogue access point in which they serve as a man in the middle from which further attacks can be carried out?

a. Evil twin
b. War twinning
c. Twin driving
d. War driving

Answer: a. Evil twin

Computer Science & Information Technology

You might also like to view...

An array's ____ method returns an integer that indicates the highest subscript in the specified dimension in the array.

A. Sort B. Reverse C. TryParse D. GetUpperBound

Computer Science & Information Technology

____ specifies formatting and placement.

A. CSS B. XML C. DHTML D. XHTML

Computer Science & Information Technology