Which of the following attacks utilizes a wireless access point which has been made to look as though it belongs to the network in order to eavesdrop on wireless traffic?

A. Evil twin
B. Rogue access point
C. WEP attack
D. War driving

Answer: A. Evil twin

Computer Science & Information Technology

You might also like to view...

The Formula Bar (as it applies to Excel 2010)

A) displays the content of the active cell. B) is at the intersection of a column and a row. C) identifies the address of the current cell. D) displays the name of a worksheet within a workbook.

Computer Science & Information Technology

You usually create a report using the Report tool or the ________, and then modify the report in Design view

Fill in the blank(s) with correct word

Computer Science & Information Technology