A technician working for a company with a wireless network named WirelessA notices a second wireless network named WirelessB. WirelessB is MOST likely a:
A. man-in-the-middle attack
B. rogue access point
C. evil twin
D. packet sniffer
Answer: B. rogue access point
You might also like to view...
The primary purpose of ____ is to help the developing organization build a product that reflects the security aims of the business.
A. individual review B. hybrid review C. directed review D. joint review
It is customary to enter identifying labels using ____, which means capitalizing only the first letter in the first word and in any words that are customarily capitalized.
A. camel capitalization B. book title capitalization C. sentence capitalization D. camel case
Microsoft has ____ built-in types of reports.
A. two B. three C. four D. six
Which of the following commands can be used to display general hardware information for the entire system?
A. lshw B. lscpu C. hwdisp D. hware