An employee at a large corporation is attempting to connect her laptop to the company's guest Wi-Fi network in a common area. Despite selecting the network that closely resembles the company's official guest network name, she finds that the connection seems unusually slow and is prompted for her corporate credentials, which is not the standard procedure. Which type of attack is most likely occurring?
Rogue access point without malicious intent
Evil twin attack