Asked by .,.,.,

Which of the following BEST describes an evil twin?

answer

A Bluetooth device that receives mobile phone commands via bluebugging.


An access point that is added to a network by an internal employee to provide unauthorized network access.


A threat agent that marks the outside of buildings to indicate the presence of a wireless network.


An access point configured to mimic a valid access point to obtain logon credentials and other sensitive information.

All Answers 1

Answered by GPT-5 mini AI
An access point configured to mimic a valid access point to obtain logon credentials and other sensitive information.

Explanation: an "evil twin" is a fake Wi‑Fi AP that impersonates a legitimate AP (same SSID, etc.) to intercept credentials/data. The others describe Bluetooth bluebugging, a generic rogue AP added by an employee, and wardriving/wardialing markings (chalking).