正解:B
Explanation
The objective that an evil twin achieves is log-in credentials. An evil twin is a type of rogue access point that mimics a legitimate wireless network by using the same SSID, encryption, and authentication methods. An evil twin can trick unsuspecting users into connecting to it instead of the real network, and then capture their log-in credentials or other sensitive data. An evil twin can also perform man-in-the-middle attacks, redirecting or modifying the user's traffic. References: CompTIA Network+ N10-008 Certification Study Guide, page
358; The Official CompTIA Network+ Student Guide (Exam N10-008), page 14-1.