A technician working for a company with a wireless network named WirelessA notices a second wireless network named WirelessB. WirelessB is MOST likely a:

A. man-in-the-middle attack
B. rogue access point
C. evil twin
D. packet sniffer


Answer: B. rogue access point

Computer Science & Information Technology

You might also like to view...

The primary purpose of ____ is to help the developing organization build a product that reflects the security aims of the business.

A. individual review B. hybrid review C. directed review D. joint review

Computer Science & Information Technology

It is customary to enter identifying labels using ____, which means capitalizing only the first letter in the first word and in any words that are customarily capitalized.

A. camel capitalization B. book title capitalization C. sentence capitalization D. camel case

Computer Science & Information Technology

Microsoft has ____ built-in types of reports.

A. two B. three C. four D. six

Computer Science & Information Technology

Which of the following commands can be used to display general hardware information for the entire system?

A. lshw B. lscpu C. hwdisp D. hware

Computer Science & Information Technology