After viewing wireless traffic, an attacker notices the following networks are being broadcasted by
local access points:
Corpnet
Coffeeshop
FreePublicWifi
Using this information the attacker spoofs a response to make nearby laptops connect back to a
malicious device. Which of the following has the attacker created?
A.
Infrastructure as a Service
B.
Load balancer
C.
Evil twin
D.
Virtualized network