Which of the following is a term used for a rogue Wi-Fi access point that appears to be legitimate but actually has been set up to intercept wireless communications?
A. Evil twin
B. Deception twin
C. Hidden access point
D. Captive access point
Answer: A. Evil twin
Computer Science & Information Technology
You might also like to view...
The ________ content control adds a field to the form that enables the user to insert unformatted text in the document
A) Static Text B) Building Block C) Rich Text D) Plain Text
Computer Science & Information Technology
The feature that allows a company to pay extra for storage when usage is above the negotiated amount with a cloud service provider is known as a(n) _____ service
Fill in the blank(s) with correct word
Computer Science & Information Technology