In order to block information users transmit, which answer refers to an attack in which a rogue wireless connection point acts as a legitimate wireless service provider?
A
Evil twin
explanation
An evil twin attack acts as a legitimate wireless service provider to intercept information users transmit.
Comments