An attacker unplugs the access point at a coffee shop. The attacker then runs software to make a laptop look
like an access point and advertises the same network as the coffee shop normally does. Which of the following
describes this type of attack?
![PrepAway - Latest Free Exam Questions & Answers](https://www.briefmenow.org/img/pa5.jpg)
A.
IV
B.
Xmas
C.
Packet sniffing
D.
Evil twin
E.
Rouge AP