1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
algol13
3 years ago
10

Barry discovers that an attacker is running an access point in a building adjacent to his company. The access point is broadcast

ing the security set identifier (SSID) of an open network owned by the coffee shop in his lobby. Which type of attack is likely taking place?
A. Evil twin
B. Wardriving
C. Bluesnarfing
D. Replay attack
Computers and Technology
1 answer:
Kamila [148]3 years ago
8 0

Answer:A) Evil twin

Explanation: Evil twin is a type of attack that happens in the network. This behaves as the alias wireless access point(WAP) which appeals toward users to get connected with false hotspot to steal their personal information.This attack is based on the rogue hotspot .Barry has also faced a evil twin attack while passing by a building and getting his device connected with fake hotspot.

Other options are incorrect because war driving is searching for the internet connectivity while driving,blue snarfing is done with Bluetooth to steal personal data and replay attack in which the transmitted data is repeated in malicious way.Thus, the correct option is option(A).

You might be interested in
Where should your two index fingers be when your fingers are rest.
PSYCHO15rus [73]

Answer: B : F and J

Explanation: Allows you to type without looking at keys and makes all the keys easily accessible

5 0
3 years ago
1.
Anna11 [10]
1. True
2. False
3. True


Have a great day <3
3 0
3 years ago
All of the following are standards that enable programs to receive data from and display data to a variety of mobile and desktop
svp [43]

Answer:

AOL

Explanation:

Some of the standards that enable programs to receive data from and display data to a variety of mobile and desktop devices includes;

I. CSS 3: it is a framework used for providing various styles used in web design.

II. HTML 5: this is a hypertext markup language used for creating web pages or website.

III. Javascript: it is a software framework that allows software components to send and receive data through a database.

IV. Service oriented architecture (SOA): this is an architectural pattern which allows various software application components to provide specific services to other applications through a network.

All of the following standards listed above enable programs to receive data from and display data to a variety of mobile and desktop devices except AOL. AOL is an acronym for American Online and it is typically used for providing internet connection through a dial-up.

3 0
3 years ago
Read 2 more answers
You have created shared folders for all your companies departments and assigned the appropriate permissions. everyone can access
larisa86 [58]
I would suggest the use of a disk quota.

Using a disk quota would limit the available space that users could have used to store data. The New Technology File system (NTFS) has several features like disk quotas to see which users are uploading the most space.  The windows interface Open Computer Management is also another option that limits the number of users of a shared folder.



8 0
4 years ago
Which kind of device does a computer need in order to provide information to a person or something else?
Keith_Richards [23]
<span>Which kind of device does a computer need in order to provide information to a person or something else?
The answer is
B. output device
</span>
3 0
3 years ago
Other questions:
  • A Color class has three int color component instance variables: red, green, and blue. Write a toString method for this class. It
    13·1 answer
  • Which of the following is not a property of a WAN:
    13·1 answer
  • If Nancy receives an encrypted message from Matthew, which key does she use to read it? Nancy’s private key Nancy’s public key M
    8·1 answer
  • The Universal Containers research lab is publishing its latest research into knowledge articles assigned to the data category "C
    15·1 answer
  • When was the idea of the cloud first developed?<br><br> 2000s<br> 1990s<br> 1960s<br> 1980s
    9·1 answer
  • Which principle of design indicates that the elements that represent the same idea or category should be placed together
    8·2 answers
  • Each of the outcomes listed below is a result of executing the following script except for one. Which one? CREATE ROLE ExampleRo
    6·1 answer
  • A user purchased a new smart home device with embedded software and connected the device to a home network. The user then regist
    5·1 answer
  • What are your initial thoughts regarding copyright and fair use after watching the clip?
    7·1 answer
  • Explain any two types of board band connection​
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!