Which of the following attacks utilizes a wireless access point which has been made to look as though it belongs to the network in order to eavesdrop on wireless traffic?

A. Evil twin
B. Rogue access point
C. WEP attack
D. War driving


Answer: A. Evil twin

Computer Science & Information Technology

You might also like to view...

Ten stacks of gold coins have ten coins each. Nine of the stacks have coins made of pure gold, and one stack has coins made of an alloy that looks exactly like gold. Each pure gold coin weighs 10 grams and each alloy coin weighs 9 grams. You have an electronic scale that can display the weight of any pile of coins with 99.99 percent accuracy. What is the fewest number of weighings needed to

determine which stack contains the alloy coins. What will be an ideal response?

Computer Science & Information Technology

An actual parameter is a variable or expression listed in a method call.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

What option automatically deletes records in related tables that match the primary key?

A. Autodelete Related Records B. Cascade Update Related Fields C. Cascade Delete Related Records D. Delete and Update Related Records

Computer Science & Information Technology

Tammy's CRT monitor needs degaussing. How does she do this?

a. She needs to take it to a professional monitor repair shop b. CRT monitors do not need degaussing c. She needs to run the degaussing tool built into the monitor d. She needs to run the Windows Degaussing Control Panel applet

Computer Science & Information Technology