Which of the following wireless attacks uses a counterfeit base station with the same SSID name
as a nearby intended wireless network?
A.
War driving
B.
Evil twin
C.
Rogue access point
D.
War chalking
Explanation:
Which of the following wireless attacks uses a counterfeit base station with the same SSID name
as a nearby intended wireless network?
Which of the following wireless attacks uses a counterfeit base station with the same SSID name
as a nearby intended wireless network?
A.
War driving
B.
Evil twin
C.
Rogue access point
D.
War chalking
Explanation: