Multiple Choice
Although rogue access devices can be installed innocently, they can also be installed by an attacker trying to gain unauthorized access to a wireless network. In such cases, these devices are called an _____.
A) Unencrypted node
B) Evil twin
C) Open node
D) Illegal server
E) Unauthorized rogue access point
Correct Answer:

Verified
Correct Answer:
Verified
Q67: The major problem with RFID has been
Q68: Refer to IT's About Business 8.1 -
Q69: With regard to mobile computing, _ means
Q70: _ refer(s) to the wireless communication of
Q71: The most common wireless technology for TV
Q73: Refer to IT's About Business 8.2 -
Q74: Refer to IT's About Business 8.6 -
Q75: Personalization means that a mobile device can
Q76: Which of the following can be used
Q77: Define Bluetooth, and give examples of its