In order to attack a wireless network, you put up an access point and override the signal of the real access point. As users send authentication data, you are able to capture it.
What kind of attack is this?
A . WEP attack
B . Drive by hacking
C . Rogue access point attack
D . Unauthorized access point attack
Answer: C
Explanation:
The definition of a Rogue access point is: