An attacker unplugs the access point at a coffee shop. The attacker then runs software to make a laptop
look like an access point and advertises the same network as the coffee shop normally does. Which of the
following describes this type of attack?
A.
IV
B.
Xmas
C.
Packet sniffing
D.
Evil twin
E.
Rouge AP