What type of access point is configured by an attacker in such a manner that it mimics an authorized access point?

A. active twin
B. authorized twin
C. internal replica
D. evil twin


Answer: D

Computer Science & Information Technology

You might also like to view...

The print head in a color ink jet printer consists of a series of ____________________, one for each color.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

What are script kiddies?

What will be an ideal response?

Computer Science & Information Technology

A set of commands called HTTP ________ help your browser to communicate with Web servers.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

As you type, Excel displays the entry in the ____ bar.

A. entry B. worksheet C. formula D. text

Computer Science & Information Technology