The type of access point configured by an attacker to mimic an authorized access point is called an Evil Twin. An Evil Twin is a rogue access point that appears to be legitimate to users but is set up to intercept and capture sensitive information.
What type of access point is configured by an attacker in such a manner that it mimics an authorized access point?
Group of answer choices
Evil twin
Active twin
Authorized twin
Internal replica
1 answer