151k views
4 votes
In a(n) __________ situation, a wireless device is configured to appear to be a legitimate access point, enabling the operator to steal passwords from legitimate users and then penetrate a wired network through a legitimate wireless access point. a) malicious association b) network injection c) ad hoc network d) identity theft

User Rdnewman
by
5.2k points

1 Answer

5 votes

Answer:

A) Malicious Association,

Hope this helps.

Step-by-step explanation:

User Cosapostolo
by
5.4k points