Multiple Choice
On wireless networks, ____ attacks are commonly done by attackers setting up a "fake" access point.
A) spoof
B) weak key
C) DoS
D) man-in-the-middle
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q1: Information security involves more than protecting the
Q3: Employees pose only a small threat to
Q4: What are the three characteristics of information
Q5: Which aspect of information security does WEP
Q6: A _ is not malicious but often
Q8: RC4 is a _ cipher that accepts
Q9: A WEP key can be a passphrase
Q10: In a brute force attack, what key
Q11: Briefly describe cryptography and discuss its history.
Q12: Describe the five steps in the process