Emmanuelamp9339 Emmanuelamp9339 03-07-2021 Computers and Technology contestada You scan the network and find a counterfeit access point that is using the same SSID as an already existing access point. What is this an example of?