header bg

Scan QR code or get instant email to install app

Question:

In order to block information users transmit, which answer refers to an attack in which a rogue wireless connection point acts as a legitimate wireless service provider?

A Evil twin
explanation

An evil twin attack acts as a legitimate wireless service provider to intercept information users transmit.

Related Information

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *

*