Multiple Choice
In a(n) ____ attack, a hacker sets up a computer to act as a legitimate access point, and then steals personal information from users trying to connect to it.
A) evil twin
B) denial-of-service
C) over-the-shoulder
D) Bluebugging
Correct Answer:

Verified
Correct Answer:
Verified
Q125: WEP and WPA both can use a
Q126: Because the 2.4 Ghz radio spectrum is
Q127: Name at least 5 of the 8
Q128: Infrared technology uses _ to carry data.
Q129: Wired Passphrase Encryption (WPE) is a security
Q131: WWAN networking provides wireless connections to the
Q132: A(n) _ is a hardware device with
Q133: MATCHING<br>-an area of Wi-Fi network coverage<br>A)piconet<br>B)bluejacking<br>C)over-the-shoulder<br>D)PDA<br>E)hotspot<br>F)MiFi<br>G)infrared<br>H)WWAN<br>I)VoIP<br>J)passphrase<br>K)WPA<br>L)MAC address
Q134: If you have both WPA and WEP
Q135: A WiMAX coverage area between the base