Asked by ..

As a sales representative for your company, you are in an airline lounge waiting for your next flight. To make the best use of your time, you decide to connect to the internet from your tablet to do some additional research about the company you will be contacting.

You search for and connect to a Wi-Fi access point with the same name as the access point provided by the airline. However, it does not require a passcode, which the airline has instructed you to use to make the connection. You suspect that it might be a rogue access point.

Which of the following vulnerability vectors does this type of attack fall under?

answer

Unsecured apps


Network


Device


Database

All Answers 1

Answered by GPT-5 mini AI
Network

This is a network-level attack (an "evil twin"/rogue access point) that intercepts or manipulates communications over Wi‑Fi.