Sara, an attacker, tricks a user into authenticating to a fake wireless network and then inserts malicious code into strings as the user passes by. Which of the following describes this attack?

A. SQL injection
B. Malicious insider
C. Evil twin
D. User impersonation


Ans: C. Evil twin

Computer Science & Information Technology

You might also like to view...

To present your Word document to others who can watch in a web browser, use:

a. PowerPoint b. Office Presentation Service c. email

Computer Science & Information Technology

Which Cisco IOS command would be configured on the local interface of a router if the hosts on the network intend to get their IPv6 addresses from a non-local DHCP server with an address of 2001:db8::1234:9876?

A) ipv6 relay destination 2001:db8::1234:9876 B) ipv6 dhcp relay 2001:db8::1234:9876 C) ipv6 helper-address 2001:db8::1234:9876 D) ipv6 dhcp relay destination 2001:db8::1234:9876

Computer Science & Information Technology

Hexadecimal offers 12 possibilities for each digit. _________________________

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A mobile user comes to you with an issue about there phone no longer charging. You put the phone on a wireless charger and it charges fine. You use the cable on another device and the cable seems to be fine. What will probably fix the problem?

A. Clean out the charging port on the device B. Replace the mobile device's battery C. Issue a new charging cable to the employee D. Send the device for service and give the employee a loaner

Computer Science & Information Technology