An attacker sets up a look-alike Wi-Fi network, tempting unsuspecting users to connect with the attacker's Wi-Fi network instead. What is this called?

A. evil twin
B. ad hoc network
C. VPN
D. guest network


Answer: A

Computer Science & Information Technology

You might also like to view...

Which range of SQL Server error message severity levels are user-generated messages that must be fixed by the user?

A. 1-10 B. 11-16 C. 17-10 D. 20-25

Computer Science & Information Technology

What is cloud computing?

What will be an ideal response?

Computer Science & Information Technology

A style is a built-in document format in OpenOffice Writer

Indicate whether the statement is true or false

Computer Science & Information Technology

When sorting tables in Word, values will be sorted in the same order, regardless of the order in which the columns are designated in the Sort dialog box

Indicate whether the statement is true or false

Computer Science & Information Technology