CompTIA Network+ N10-006 Q311

Which of the following attacks utilizes a wireless access point which has been made to look as though it belongs to the network in order to eavesdrop on wireless traffic?

A. Evil twin
B. Rogue access point
C. WEP attack
D. War driving

Correct Answer: A
Section: Mix questions