After viewing wireless traffic, an attacker notices the following networks are being broadcasted by
local access points:
Corpnet
Coffeeshop
FreePublicWifi
Using this information the attacker spoofs a response to make nearby laptops connect back to a
malicious device. Which of the following techniques are used above? (Select TWO).

A.
Blue snarfing
B.
Evil twin
C.
Packet sniffing
D.
War dialing
E.
Rogue access point
Explanation: