1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
weqwewe [10]
3 years ago
5

An attacker sets up a look-alike wi-fi network, tempting unsuspecting users to connect with the attacker's wi-fi network instead

. what is this called?
Computers and Technology
1 answer:
WARRIOR [948]3 years ago
6 0
The correct answer: <span>Impersonating a legitimate network

</span><span>An attacker could impersonate a network by creating a look-alike network to lure unsuspecting users to connect to the attacker’s network. The attacker could do this without using an AP by setting up an ad hoc or peer-to-peer network that connects wireless devices directly to another wireless device. The attacker would give ad hoc network misleading names, such as Free Wireless Network or Free Airport Network. Once the user establishes a connection, the attacker might be able to directly inject malware into the user’s machine or steal data.
</span>
<span>Attacks on wireless networks is typically a three-step process: discovering the wireless network, connecting to the network, and launching the attack.</span>
You might be interested in
How do you open an application on the macOS?
timama [110]

Click the Launchpad icon in the Dock, or pinch closed with your thumb and three fingers on your trackpad. Then click an app to open it. You can also type an app's name to find the app in Launchpad, then press the Return key to open it.

3 0
3 years ago
Read 2 more answers
Which feature of a router provides traffic flow and enhances network security?
Vika [28.1K]
The answer would be...<span>ACLs</span>
6 0
3 years ago
Why is body language an important factor in a business meeting
slava [35]

The importance of the body language in business. Body language is a language without spoken words, it is called non verbal communication. We use it all the time in our social life and business life so it is all about gestures movements and expressions made by people to deliver a specific message to other people. Business meetings are all about making a good impression.

5 0
3 years ago
In relation to data science,advances in technology has made it more feasible to do what
Reika [66]
In recent years data science has become less and less about the data itself, and more about the technology and tools used to interact with it. Advanced solutions like AI, machine learning and robust analytics tools make it possible not just to process and understand massive stores of information but at unprecedented speeds.
3 0
3 years ago
You are the information security officer at a medium-sized company (1,500 employees). the cio asks you to explain why you believ
Ivahew [28]
If your CIO asks such a stupid question run for the hill, he should not hold that title.
Every company, small, medium or large should have Firewalls, Intrusion Detection, Managed Virus Protection Software at the very least. Windows is the most deployed OS in the world and of course the main target of hackers i.e Viruses. MAC's to a lesser extent and Unix while probably the least vulnerable are still not immune to Viruses/Trojan and other Malware.

Users can still be the victims of trojan horses, phishing scams, and other online fraud. There<span> is no such thing as a 100% safe computer, a </span>Mac<span>, Windows, and even Linux are all capable of being infected with a </span>virus<span> or other malware.
</span>
Lastly, physical access to any computer that is not encrypted is vulnerable.
5 0
3 years ago
Other questions:
  • (Game Design) Which of the following is NOT a name of a popular digital sculpting application?
    13·1 answer
  • A computer’s BIOS is defined as the
    12·2 answers
  • _________ is the biggest problem you can face if you don’t identify the scope of your risk management project. Scope creep Nonco
    10·1 answer
  • Create a new file that builds a shopping list from a user. There should be a input query that asks the user to list an item and
    11·1 answer
  • Describe what a structure is in a living thing?
    9·1 answer
  • Within a Microsoft Windows environment, who has access rights to the Encrypting File System (EFS) features and functions?
    7·1 answer
  • Does paste link Always increases the size of the referenced document ?
    14·1 answer
  • A program is
    7·1 answer
  • _____ are labels for data, while _____ tie values together into one entity.
    15·1 answer
  • Write and test a program that computes the area of a circle. This program should request a number representing a radius as input
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!