joylogger1761 joylogger1761 24-11-2022 Computers and Technology contestada a victim connects to a network they think is legitimate, but the network is really an identical network controlled by a hacker. what type of network attack are they a victim of?