Multiple Choice
A notebook computer configured to act like a real access point is a(n) ________.
A) evil twin access point
B) rogue access point
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q2: In which frequency band does NFC operate?<br>A)2.4
Q3: To drive around a city looking for
Q4: In _,the authenticator is the _.<br>A)802.1X, wireless
Q5: A rogue access point _.<br>A)is an unauthorized
Q6: Managed access points should _.<br>A)allow access point
Q8: A power ratio of 8/1 decrease in
Q9: In VPNs designed to frustrate evil twin
Q10: If a company uses 802.11i for its
Q11: Managed access points should _.<br>A)identify rogue access
Q12: Which offers stronger security?<br>A)WPA<br>B)802.11i<br>C)Both A and B