Which of the following can be used to compromise a WPA encrypted wireless network when the
rainbow table does not contain the key?
A.
Evil twin
B.
War chalking
C.
Buffer overflow
D.
Virus
Explanation:
An evil twin is the wireless version of the phishing scam. An attacker fools wireless users into
connecting a laptop or mobile phone to a tainted hotspot by posing as a legitimate provider.This
type of evil twin attack may be used to steal the passwords of unsuspecting users by either
snooping the communication link or by phishing, which involves setting up a fraudulent web site
and luring people there.