A user has plugged in a wireless router from home with default configurations into a network jack
at the office. This is known as:
A.
an evil twin.
B.
an IV attack.
C.
a rogue access point.
D.
an unauthorized entry point.
A user has plugged in a wireless router from home with default configurations into a network jack
at the office. This is known as:
A user has plugged in a wireless router from home with default configurations into a network jack
at the office. This is known as:
A.
an evil twin.
B.
an IV attack.
C.
a rogue access point.
D.
an unauthorized entry point.