An attacker utilizes a Wi-Fi Pineapple to run an access point with a legitimate-looking SSID for a nearby business in order to capture the wireless password.
What kind of attack is this?
A. MAC spoofing attack
B. War driving attack
C. Phishing attack
D. Evil-twin attack
What kind of attack is this?
A. MAC spoofing attack
B. War driving attack
C. Phishing attack
D. Evil-twin attack