Which of the following BEST describes a rogue Access Point (AP)?

Which of the following BEST describes a rogue Access Point (AP)?

Which of the following BEST describes a rogue Access Point (AP)?

A.
An AP that is not protected by a firewall

B.
An AP not configured to use Wired Equivalent Privacy (WEP) with Triple Data Encryption
Algorithm (3DES)

C.
An AP connected to the wired infrastructure but not under the management of authorized
network administrators

D.
An AP infected by any kind of Trojan or Malware



Leave a Reply 0

Your email address will not be published. Required fields are marked *

11 − nine =