An attacker Joe configures his service identifier to be the same as an access point advertised on a billboard. Joe then conducts a denial of service attack against the legitimate AP causing users to drop their connections and then reconnect to Joe's system with the same SSID. Which of the following Best describes this type of attack?

A. Bluejacking
B. WPS attack
C. Evil twin
D. War driving
E. Relay attack


Answer: C. Evil twin

Computer Science & Information Technology

You might also like to view...

What are probable results of attending and participating in trade shows and conventions at which you can speak with prospective consumers?

(a) Lower total unique hits on your site. (b) An increased number of items in your merchandise catalog. (c) Brand awareness and increased exposure. (d) The acquisition of a dynamite domain name.

Computer Science & Information Technology

Draw a flowchart for the program fragments (no need to show start and stop)

``` DO UNTIL n = 3 LET sum = sum + n LET n = n + 1 LOOP ```

Computer Science & Information Technology

Which of the following tools is an add-in?

A) One-variable data table B) Goal Seek C) Scenario Manager D) Solver

Computer Science & Information Technology

____________________ is a product from Microsoft that provides a baseline configuration specifically designed for high-risk environments like bastion hosts.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology