Which of the following attacks utilizes a wireless access point which has been made to look as though it belongs to the network in order to eavesdrop on wireless traffic?
A.
Evil twin
B.
Rogue access point
C.
WEP attack
D.
War driving
Which of the following attacks utilizes a wireless access point which has been made to look as though it belongs to the network in order to eavesdrop on wireless traffic?
Which of the following attacks utilizes a wireless access point which has been made to look as though it belongs to the network in order to eavesdrop on wireless traffic?
A.
Evil twin
B.
Rogue access point
C.
WEP attack
D.
War driving