What scenario describes an evil twin attack?

a. A malicious access point is configured with the SSID of a non-malicious public access point.
b. An attacker is actively attempting to brute force the PIN of a WPS enabled access point.
c. A hacker is actively sending wireless probes to discover available wireless networks.
d. A hacker is utilizing a protocol analyzer on a public Wi-Fi network to discover packet contents.


ANSWER: a

Computer Science & Information Technology

You might also like to view...

The number of calls to recursively calculate the Fibonacci value of 7 is:

a. 7 b. 13 c. 41 d. 39

Computer Science & Information Technology

The Utility menu included with many inkjet printers provides a variety of diagnostic tools. The ______ utility is used to correct misaligned vertical straight-line or large characters

a. Status or ink monitor b. Nozzle check c. Head cleaning d. Print head alignment

Computer Science & Information Technology

Collections, such as that pictured in the accompanying figure, allow computers to share which of the following?

A. resources B. systems C. links D. media

Computer Science & Information Technology

This process improves system performance by acting as a temporary high-speed holding area between a secondary storage device and the CPU.

A. RAID B. data access C. data compression D. disk caching

Computer Science & Information Technology