Which of the following is a term used for a rogue Wi-Fi access point that appears to be legitimate but actually has been set up to intercept wireless communications?
A. Evil twin
B. Deception twin
C. Hidden access point
D. Captive access point
Answer: A. Evil twin
Computer Science & Information Technology
You might also like to view...
A(n) ____ is an example of a secondary memory device.
A. register B. RAM chip C. USB flash drive D. virtual disk
Computer Science & Information Technology
How do you determine how the elements of an array can be used in a program?
What will be an ideal response?
Computer Science & Information Technology
What could cause a MAC flapping event?
What will be an ideal response?
Computer Science & Information Technology
In the code for the __sub__ method for the AbstractSet class, what is the missing code?
def __sub__(self, other): difference = type(self)() for item in self: if not item in other:
A. difference.remove(item) B. intersection.add(item) C. difference.add(item) D. return(item)
Computer Science & Information Technology