Asked by ..

Which of the following BEST describes a rogue access point attack?

answer

A hacker taking advantage of an access point that has not implemented the basic techniques to protect the network.


A hacker getting a user or client to unintentionally connect to their access point instead of the legitimate point the user intended to use.


A hacker installing an unauthorized access point within a company.


A hacker advertising an access point using an extremely strong signal for malicious purposes.

All Answers 1

Answered by GPT-5 mini AI
A hacker installing an unauthorized access point within a company.

Explanation: a "rogue access point" is an unauthorized AP connected to a network (installed by an attacker or careless employee) that bypasses security controls. (Option 2 describes an "evil twin" or AP‑spoofing attack.)