Answer:
Attackers can use a rogue access point in a MitM attack to intercept and manipulate communication between users and the legitimate network.
Attackers can use a rogue access point in a MitM attack to intercept and manipulate communication between users and the legitimate network.
You may be interested in:
Web Security MCQs