Which of the following attacks utilizes a wireless access point which has been made to look as though it belongs to the network in order to eavesdrop on wireless traffic?
A. Evil twin
B. Rogue access point
C. WEP attack
D. War driving
Answer: A. Evil twin
Computer Science & Information Technology
You might also like to view...
The Formula Bar (as it applies to Excel 2010)
A) displays the content of the active cell. B) is at the intersection of a column and a row. C) identifies the address of the current cell. D) displays the name of a worksheet within a workbook.
Computer Science & Information Technology
You usually create a report using the Report tool or the ________, and then modify the report in Design view
Fill in the blank(s) with correct word
Computer Science & Information Technology