Exam4Training

This is an example of which of following threats?

A network technician is performing a wireless survey in the office and discovers a device that was not installed by the networking team.

This is an example of which of following threats?
A . Bluesnarfing
B . DDoS
C . Brute force
D . Rogue AP

Answer: D

Explanation:

A rogue access point is when a wireless access point is located on a network without the administrator being awareof it. Therefore, if the device was not installed by the networking team, the administrator would not know about it being there.

Exit mobile version