Evil twins are:

a. email messages that mimic the email messages of a legitimate business.
b. fraudulent websites that mimic a legitimate business's website.
c. computers that fraudulently access a website or network using the IP address and identification of an authorized computer.
d. bogus wireless network access points that look legitimate to users.
e. Trojan horses that appears to the user to be a legitimate commercial software application.

Respuesta :

Answer:

d. bogus wireless network access points that look legitimate to users.

Explanation:

Evil twins in Information Technology Security is a wireless network access point that as gone rouge but behaves like every other access point and when user connect to the wireless access point, an attacker can access the users data without the users knowledge.

Answer:

The correct answer to the following question will be Option d.

Explanation:

Evin twins is a wireless LAN or wi-fi access point that appears to be legal to users. With the advancement of wireless technology in public areas also known as base station clones and honeypots.

For some simple browsing, shopping and banking, an evil twin hotspot should be avoided. And the other option should not be considered as part of the evil twins.

So, option d is the correct answer.

ACCESS MORE
ACCESS MORE
ACCESS MORE
ACCESS MORE