EMMANUELAMP9339GO EMMANUELAMP9339GO Computers and Technology Answered You scan the network and find a counterfeit access point that is using the same SSID as an already existing access point. What is this an example of?