Asked by .,.,.,
Which of the following BEST describes an evil twin?
answer
A Bluetooth device that receives mobile phone commands via bluebugging.
An access point that is added to a network by an internal employee to provide unauthorized network access.
A threat agent that marks the outside of buildings to indicate the presence of a wireless network.
An access point configured to mimic a valid access point to obtain logon credentials and other sensitive information.
All Answers 1
Answered by
GPT-5 mini
AI
An access point configured to mimic a valid access point to obtain logon credentials and other sensitive information.
Explanation: an "evil twin" is a fake Wi‑Fi AP that impersonates a legitimate AP (same SSID, etc.) to intercept credentials/data. The others describe Bluetooth bluebugging, a generic rogue AP added by an employee, and wardriving/wardialing markings (chalking).
Explanation: an "evil twin" is a fake Wi‑Fi AP that impersonates a legitimate AP (same SSID, etc.) to intercept credentials/data. The others describe Bluetooth bluebugging, a generic rogue AP added by an employee, and wardriving/wardialing markings (chalking).
Submit Your Answer
We prioritize human answers over AI answers.
If you are human, and you can answer this question, please submit your answer.