1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
algol13
3 years ago
10

Barry discovers that an attacker is running an access point in a building adjacent to his company. The access point is broadcast

ing the security set identifier (SSID) of an open network owned by the coffee shop in his lobby. Which type of attack is likely taking place?
A. Evil twin
B. Wardriving
C. Bluesnarfing
D. Replay attack
Computers and Technology
1 answer:
Kamila [148]3 years ago
8 0

Answer:A) Evil twin

Explanation: Evil twin is a type of attack that happens in the network. This behaves as the alias wireless access point(WAP) which appeals toward users to get connected with false hotspot to steal their personal information.This attack is based on the rogue hotspot .Barry has also faced a evil twin attack while passing by a building and getting his device connected with fake hotspot.

Other options are incorrect because war driving is searching for the internet connectivity while driving,blue snarfing is done with Bluetooth to steal personal data and replay attack in which the transmitted data is repeated in malicious way.Thus, the correct option is option(A).

You might be interested in
The second row of letters on the keyboard is called the______ row
Mkey [24]
The 2nd row of ur keyboard its called home row !

5 0
4 years ago
Read 2 more answers
1. What does MS-DOS use for input?
Ket [755]

1. The answer is Command-line base

MS-DOS is a single user, single tasking OS that use a command line interface. MS –DOS is the perfect example of a command line interface. CLI is a text based interface used by operating systems and software and performs particular tasks by entering commands. Unlike the GUI (Graphical User Interface), the CLI uses a very easy mechanism which is not user friendly.  

2. The answer is carry electrical current

Transistors are semiconductor devices used to control the flow of electricity in circuits. They contain three layers of silicon that are used to amplify or switch electric currents. They are very fundamental in modern electronic devices and are considered one of the greatest inventions in modern history. In small quantities, transistors are used to make simple switches and digital logic. In huge quantities, transistors are interconnected and combined into small chips that create complex ICs, computer memories, and processors.

3. The answer is True

A peripheral device such as a keyboard, a mouse, or a printer is a hardware input or output device that gives the computer additional functionalities and serve as an auxiliary computer device. They are commonly known as I/O devices because they provide input and output information for the computer.

4. The answer is A: Interacts with or sends data to the computer

A peripheral device as mentioned above is used to input information into and get it out of the computer. In addition, an input device sends data, information, or instructions to the computer. Examples of input devices include, keyboard, mouse, graphics tablet, game controller, read only memory, and many more.

5. The answer is doc .

Doc file extension is the general default binary and XML-based format for Word 97 all the way to Word 2019. This file extension can contain formatted texts, tables, images, page formatting, and graphs. Depending on the versions of the Microsoft Word, the standards for the DOC extension change slightly from .doc to .docx


5 0
3 years ago
What function does the ALU perform?
mixas84 [53]
The correct answer is B
6 0
3 years ago
Which feature of the Excel window should I use to perform an action
Ne4ueva [31]
It depends on which action. 
5 0
3 years ago
why are the ads you might see on tv between 8am and 10am usually not the same ads you would see between 8pm and 10pm?
sdas [7]

Answer:

THEY rotate.

Explanation:

6 0
3 years ago
Other questions:
  • In what ways are Outlook notes useful for personal or professional use? Check all that apply.
    13·2 answers
  • Which of the following terms means that the system changes based on
    14·1 answer
  • Assuming that t is an array and tPtr is a pointer to that array, which expression refers to the address of element 3 of the arra
    7·1 answer
  • Consider a binary-search method in an array that reports whether an object is in the array. The documentation indicates that the
    11·1 answer
  • (PYTHON HOMEWORK)Given the following code snippet, which statement tests to see if all three sets are equal?:
    11·1 answer
  • Bill, a project manager, wants to hire external resources. What step should Bill take before hiring external resources?
    7·1 answer
  • In an income statement subtracting the cost of goods sold from the net sales provides the?
    11·1 answer
  • What is the school wifi password trying to do my class work in school on different devices.
    9·1 answer
  • Brain for free 12628397
    14·2 answers
  • Which of the following is not considered essential for an electronic device to be called a computer?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!