An attacker unplugs the access point at a coffee shop. The attacker then runs software to make a laptop look like an access point and advertises the same network as the coffee shop normally does. Which of the following describes this type of attack?

A. IV
B. Xmas
C. Packet sniffing
D. Evil twin
E. Rouge AP


Answer: D. Evil twin

Computer Science & Information Technology

You might also like to view...

Object orientation uses classes to:

a) develop algorithms b) encapsulate data and methods c) organize large amounts of data d) None of the above.

Computer Science & Information Technology

Access will identify logical errors in calculated fields

Indicate whether the statement is true or false

Computer Science & Information Technology

To continue page numbers from one section to the next, the ________ option should be chosen

Fill in the blank(s) with correct word

Computer Science & Information Technology

List three items that can be recovered by the Windows Server Backup tool, assuming the item is in the backup.

What will be an ideal response?

Computer Science & Information Technology