In order to attack wireless network, you put up an access point and override the signal of the real access point. And when users send authentication data, you are able to capture it.
What kind of attack is this?
A.
WEP Attack
B.
Drive by hacking
C.
Rogue Access Point Attack
D.
Unauthorized Access Point Attack
Explanation:
A rogue access point is a wireless access point that has either been installed on a secure company network without explicit authorization from a local network management or has been created to allow a cracker to conduct a man-in-the-middle attack.