Various devices are connecting and authenticating to a single evil twin within the network. Which of the following are MOST likely being targeted?
A. Mobile devices
B. All endpoints
C. VPNs
D. Network infrastructure
E. Wired SCADA devices
Various devices are connecting and authenticating to a single evil twin within the network. Which of the following are MOST likely being targeted?
A. Mobile devices
B. All endpoints
C. VPNs
D. Network infrastructure
E. Wired SCADA devices