Which of the following is a term used for a rogue Wi-Fi access point that appears to be legitimate but actually has been set up to intercept wireless communications?

A. Evil twin
B. Deception twin
C. Hidden access point
D. Captive access point

Answer: A. Evil twin

Computer Science & Information Technology

You might also like to view...

The ________ content control adds a field to the form that enables the user to insert unformatted text in the document

A) Static Text B) Building Block C) Rich Text D) Plain Text

Computer Science & Information Technology

The feature that allows a company to pay extra for storage when usage is above the negotiated amount with a cloud service provider is known as a(n) _____ service

Fill in the blank(s) with correct word

Computer Science & Information Technology