which has been made to look as though it belongs to the… admin 7 years ago Which of the following attacks utilizes a wireless access point which has been made to look as though it belongs to the network in order to eavesdrop on wireless traffic? A. Evil twin B. Rogue access point C. WEP attack D. War driving ← Previous question Next question →