CompTIA Exam Questions

which has been made to look as though it belongs to the…

Which of the following attacks utilizes a wireless access point which has been made to look as though it
belongs to the network in order to eavesdrop on wireless traffic?

A.
Evil twin

B.
Rogue access point

C.
WEP attack

D.
War driving