This is an example of which of following threats?
A network technician is performing a wireless survey in the office and discovers a device that was not installed by the networking team.
This is an example of which of following threats?
A . Bluesnarfing
B . DDoS
C . Brute force
D . Rogue AP
Answer: D
Explanation:
A rogue access point is when a wireless access point is located on a network without the administrator being awareof it. Therefore, if the device was not installed by the networking team, the administrator would not know about it being there.
Subscribe
Login
0 Comments
Inline Feedbacks
View all comments