which of the following best describes an evil twin?
A threat agent that marks the outside of buildings to indicate the presence of a wireless network.
An access point that is configured to mimic a valid access point to obtain logon credentials and other sensitive information.
A Bluetooth device that receives mobile phone commands via bluebugging.
An access point that is added to a network by an internal employee to provide unauthorized network access.