Ann, a user, connects to her company’s secured wireless network in the conference room when
attending meetings. While using the conference room this morning, Ann notices an unsecured
wireless network with the same name is available. Ann connects her laptop to this network instead
of to the secured one. Ann has fallen victim to which of the following threats?
A.
Rogue access point
B.
ARP poisoning
C.
Replay attack
D.
Evil twin