Which of the following would BEST describe this scenario?

The normal SSID for a company is Internal A. Another SSID is being picked up called Internal B, which requires users to input their network username and password. Users are connecting to this secondary hot-spot via their laptops. Which of the following would BEST describe this scenario?

The normal SSID for a company is Internal A. Another SSID is being picked up called Internal B, which requires users to input their network username and password. Users are connecting to this secondary hot-spot via their laptops. Which of the following would BEST describe this scenario?

A.
WEP cracking

B.
Rogue access point

C.
War driving

D.
WPA cracking



Leave a Reply 0

Your email address will not be published. Required fields are marked *