What type of access point is configured by an attacker in such a manner that it mimics an authorized access point?
A. active twin
B. authorized twin
C. internal replica
D. evil twin
Answer: D
Computer Science & Information Technology
You might also like to view...
The print head in a color ink jet printer consists of a series of ____________________, one for each color.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
What are script kiddies?
What will be an ideal response?
Computer Science & Information Technology
A set of commands called HTTP ________ help your browser to communicate with Web servers.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
As you type, Excel displays the entry in the ____ bar.
A. entry B. worksheet C. formula D. text
Computer Science & Information Technology