Which of the following is a wireless device that is created to allow a cracker to conduct a man-in- the-middle attack?

A.
Protocol analyzer
B.
Lightweight Access Point
C.
WLAN controller
D.
Rogue access point
Explanation:
A rogue AP (rogue access point) is a wireless access point that has either been installed on a secure company network without explicit authorization from a local network administrator, or has been created to allow a cracker to conduct a man-in-the-middle attack. A rogue access point creates a security threat to large organizations because anyone with access to the premises can maliciously install an inexpensive wireless router that can allow access to a secure network to unauthorized parties. Rogue access points do not employ mutual authentication.Answer C is incorrect. A wireless LAN controller is a device that is used in combination with Lightweight Access Point Protocol (LWAPP) to manage light weight access points in large quantities by the network administrator orNOC. The Wireless LAN controller is part of the Data Plane within the Cisco Wireless Model. The WLAN controller automatically handles the configuration of anywhere from 6 to 300 wireless accesspoints, depending on the model.
Answer A is incorrect. Protocol analyzer (also known as a network analyzer, packet analyzer or sniffer, or for particular types of networks, an Ethernet sniffer or wireless sniffer) is computer software or computer hardware that can intercept and log traffic passing over a digital network. As data streams flow across the network, the sniffer captures each packet and, if needed, decodes and analyzes its content according to the appropriate RFC or other specifications.
Answer B is incorrect. Lightweight Access Point is an 802.11 a/b/g dual-band, zero-touch configuration and management access point that provides secure, cost effective wireless access with advanced WLAN services for enterprise deployments. This lightweight access point provides industry-leading RF capabilities to increase wireless LAN performance, security, reliability, and scalability.
Reference. http.//en.wikipediA.org/wiki/Rogue_access_point