Which of the following is a term used for a rogue Wi-Fi access point that appears to be legitimate but actually has been set up to intercept wireless communications?

A. Evil twin
B. Deception twin
C. Hidden access point
D. Captive access point


Answer: A. Evil twin

Computer Science & Information Technology

You might also like to view...

A(n) ____ is an example of a secondary memory device.

A. register B. RAM chip C. USB flash drive D. virtual disk

Computer Science & Information Technology

How do you determine how the elements of an array can be used in a program?

What will be an ideal response?

Computer Science & Information Technology

What could cause a MAC flapping event?

What will be an ideal response?

Computer Science & Information Technology

In the code for the __sub__ method for the AbstractSet class, what is the missing code? def __sub__(self, other): difference = type(self)() for item in self: if not item in other: return difference

A. difference.remove(item) B. intersection.add(item) C. difference.add(item) D. return(item)

Computer Science & Information Technology