What is an 'Evil twin' in the context of network security?
A software tool used by network administrators to monitor network traffic.
A standard procedure in secure network installations.
A rogue Wi-Fi access point set up to mimic a legitimate one to intercept data.
A duplicate network cable installed to reroute data.
A type of network encryption protocol.