diff --git a/FAQ.md b/FAQ.md
index 0a98a02..cc5dc8e 100644
--- a/FAQ.md
+++ b/FAQ.md
@@ -4,6 +4,9 @@ This is a social engineering attack and it's pointless to drag clients in automa
### There's no Internet connectivity in the fake access point
There shouldn't be one. All of the traffic is being sinkholed to the built in captive portal via a fake DNS responder in order to capture the credentials.
+### No access point is generated by the `Captive Portal` attack
+The most common cause for this is using a driver that does not support virtual interfaces. Fluxion's `Captive Portal` attack may use a virtual interface to simulate a secondary wireless adapter, one is used for jamming the target access point, while the other is used for generating the "evil twin" access point. The **`realtek-rtl88xxau-dkms`** is a relatively popular driver that **does not support virtual interfaces**.
+
### I need to sign in (on Android)
This is how the script works. The fake captive portal is set up by the script itself to collect the credentials. Don't freak, it's all okay.
@@ -37,5 +40,5 @@ Fluxion 2 and older
**Note:**
The folder get erased after exit. If the debug mode is on the folder get not erased.
-### Optimal CHIP
-It is recommended that you use network adapters that support Access Point mode. For the best purchase check out the chip at https://wikidevi.com/wiki/Wireless_adapters/Chipset_table
\ No newline at end of file
+### Optimal Chipsets
+It's required you use network adapters supporting master (access point) mode. If you don't currently own an adapter, we suggest you make an educated purchase by looking into [devices and their chipsets here](https://wikidevi.com/wiki/Wireless_adapters/Chipset_table).
\ No newline at end of file