While staying at a hotel, a user attempts to connect to the hotel Wi-Fi but notices that multiple SSIDs have very similar names. Which of the following social-engineering attacks is being attempted?
A. Evil twin
B. Impersonation
C. Insider threat
D. Whaling
A. Evil twin
B. Impersonation
C. Insider threat
D. Whaling