Which of the following attacks utilizes a wireless access point which has been made to look as though it belongs to the network in order to eavesdrop on wireless traffic?
A. Evil twin
B. Rogue access point
C. WEP attack
D. War driving
Answer: A. Evil twin
You might also like to view...
Ten stacks of gold coins have ten coins each. Nine of the stacks have coins made of pure gold, and one stack has coins made of an alloy that looks exactly like gold. Each pure gold coin weighs 10 grams and each alloy coin weighs 9 grams. You have an electronic scale that can display the weight of any pile of coins with 99.99 percent accuracy. What is the fewest number of weighings needed to
determine which stack contains the alloy coins. What will be an ideal response?
An actual parameter is a variable or expression listed in a method call.
Answer the following statement true (T) or false (F)
What option automatically deletes records in related tables that match the primary key?
A. Autodelete Related Records B. Cascade Update Related Fields C. Cascade Delete Related Records D. Delete and Update Related Records
Tammy's CRT monitor needs degaussing. How does she do this?
a. She needs to take it to a professional monitor repair shop b. CRT monitors do not need degaussing c. She needs to run the degaussing tool built into the monitor d. She needs to run the Windows Degaussing Control Panel applet