Which of the following attacks utilizes a wireless access point which has been made to look as though it belongs to the network in order to eavesdrop on wireless traffic?

Which of the following attacks utilizes a wireless access point which has been made to look as though it belongs to the network in order to eavesdrop on wireless traffic?
A. Evil twin
B. Rogue access point
C. WEP attack
D. War driving

Exam N10-008: CompTIA Network+

Free dumps for N10-008 in PDF format.

High quality N10-008 PDF and software. VALID exam to help you pass.

comptia-exams

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.