This is categorized as a man-in-a-middle-attack in which a rogue wireless access point poses as a legitimate one by broadcasting a legitimate SSID and eavesdrops on the wireless network.
What will be an ideal response?
evil twin
Computer Science & Information Technology
You might also like to view...
One of the core principles of software programming, which describes the process of accepting user input and returning a useful response, is known as ________
Fill in the blank(s) with correct word
Computer Science & Information Technology
The steps taken to gather and analyze digital evidence are known as a ____.
A. forensic investigation B. threat investigation C. system investigation D. risk investigation
Computer Science & Information Technology