Fill in the blank with appropriate choice. '........is a type of attack involving a rogue Wi-Fi access point that appears to be a legitimate one provided on the premises but has been setup to eavesdrop on wireless communications. It's the wireless version of a phishing scam. By posing as a legitimate provider, an attacker fools wireless users into connecting a laptop or mobile phone to a tainted hotspot. This type of attack may be used to steal passwords from unsuspecting users by snooping the communication link or by phishing, which includes creating a fake website and attracting people to it.'