A technician working for a company with a wireless network named WirelessA notices a second wireless
network named WirelessB. WirelessB is MOST likely a:
A.
man-in-the-middle attack.
B.
rogue access point.
C.
evil twin.
D.
packet sniffer.
A technician working for a company with a wireless network named WirelessA notices a second wireless
network named WirelessB. WirelessB is MOST likely a:
A technician working for a company with a wireless network named WirelessA notices a second wireless
network named WirelessB. WirelessB is MOST likely a:
A.
man-in-the-middle attack.
B.
rogue access point.
C.
evil twin.
D.
packet sniffer.
rogue access point- unauthorized WAP installed in computer network