Multiple Choice
Evil twins are
A) Trojan horses that appears to the user to be a legitimate commercial software application.
B) e-mail messages that mimic the e-mail messages of a legitimate business.
C) fraudulent Web sites that mimic a legitimate business's Web site.
D) bogus wireless networks that look legitimate to users.
Correct Answer:

Verified
Correct Answer:
Verified
Q12: The range of Wi-Fi networks can be
Q18: _ use scanning software to look for
Q22: How can a firm's security policies contribute
Q39: A firewall is a combination of hardware
Q43: _ refers to policies, procedures, and technical
Q90: Statements ranking information risks and identifying security
Q161: A _ is a device about the
Q162: Betty downloaded a peer to peer file
Q166: _ planning focuses on how the company
Q168: _ also may involve redirecting a Web