which has been made to look as though it belongs to the…

Which of the following attacks utilizes a wireless access point which has been made to look as though it belongs to the network in order to eavesdrop on wireless traffic?

Which of the following attacks utilizes a wireless access point which has been made to look as though it belongs to the network in order to eavesdrop on wireless traffic?

A.
Evil twin

B.
Rogue access point

C.
WEP attack

D.
War driving



Leave a Reply 0

Your email address will not be published. Required fields are marked *