Which of the following attacks utilizes a wireless access point which has been made to look as though it belongs to the network in order to eavesdrop on wireless traffic?
A. Evil twin
B. Rogue access point
C. WEP attack
D. War driving
Exam N10-008: CompTIA Network+Free dumps for N10-008 in PDF format.High quality N10-008 PDF and software. VALID exam to help you pass. |