After reviewing device security you learn that a malicious user in an airport terminal seating area wasable to connect wirelessly to



After reviewing device security you learn that a malicious user in an airport
terminal seating area wasable to connect wirelessly to a traveling employee’s
smartphone and downloaded her ccontact list. Which type of attack has taken place?




Leave a Reply

Your email address will not be published.