The process whereby an attacker can trick a corporate mobile device to connect to an impostor AP is referred to as which of the following?

A. inserting network traffic
B. denial of service
C. hijacking the wireless connection
D. reading data


Answer: C

Computer Science & Information Technology

You might also like to view...

If you want to rearrange your layers in order to change their visibility or to better organize them, simply drag the layer up or down on the _________________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

? Case-Based Critical Thinking Questions ? Case 3-2 Terry is building a web site and wants to have three main links called Home, Product Info, and Contact Us. She will create a hierarchy of page elements and revise the style sheets. ?Terry has decided to display the text of all h1 headings found within the page header in green. The style rule applied should be _____.

A. ?header h1 {shade: green;} B. ?header h1 {green: shade;} C. ?header h1 {green: color;} D. ?header h1 {color: green;}

Computer Science & Information Technology

The size of the application icon should be __________________ x 512 pixels stored in a PNG file.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

If you apply a rule above  text, then move the text, the rule moves with the text.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology