33. Which of the following would describe an attack in which the attacker sets up a. malicious access point configured almost identically to a legitimate one?
(A)Impersonation attack
(B) Evil twin attack
(C) Spoofing attack
(D) Rogue traffic attack
答案:登入後查看
統計: A(0), B(0), C(1), D(0), E(0) #3557275
統計: A(0), B(0), C(1), D(0), E(0) #3557275