An attacker sets up a look-alike Wi-Fi network, tempting unsuspecting users to connect with the attacker's Wi-Fi network instead. What is this called?
A. evil twin
B. ad hoc network
C. VPN
D. guest network
Answer: A
Computer Science & Information Technology
You might also like to view...
Which range of SQL Server error message severity levels are user-generated messages that must be fixed by the user?
A. 1-10 B. 11-16 C. 17-10 D. 20-25
Computer Science & Information Technology
What is cloud computing?
What will be an ideal response?
Computer Science & Information Technology
A style is a built-in document format in OpenOffice Writer
Indicate whether the statement is true or false
Computer Science & Information Technology
When sorting tables in Word, values will be sorted in the same order, regardless of the order in which the columns are designated in the Sort dialog box
Indicate whether the statement is true or false
Computer Science & Information Technology