198k views
5 votes
Evil twins are:

a. email messages that mimic the email messages of a legitimate business.
b. fraudulent websites that mimic a legitimate business's website.
c. computers that fraudulently access a website or network using the IP address and identification of an authorized computer.
d. bogus wireless network access points that look legitimate to users.
e. Trojan horses that appears to the user to be a legitimate commercial software application.

User Jotschi
by
6.6k points

2 Answers

5 votes

Answer:

The correct answer to the following question will be Option d.

Step-by-step explanation:

Evin twins is a wireless LAN or wi-fi access point that appears to be legal to users. With the advancement of wireless technology in public areas also known as base station clones and honeypots.

For some simple browsing, shopping and banking, an evil twin hotspot should be avoided. And the other option should not be considered as part of the evil twins.

So, option d is the correct answer.

User Rhgb
by
5.5k points
5 votes

Answer:

d. bogus wireless network access points that look legitimate to users.

Step-by-step explanation:

Evil twins in Information Technology Security is a wireless network access point that as gone rouge but behaves like every other access point and when user connect to the wireless access point, an attacker can access the users data without the users knowledge.

User Eduardo Ivanec
by
5.7k points