A network technician is performing a wireless survey in the office and discovers a device that was
not installed by the networking team. This is an example of which of following threats?
A.
Bluesnarfing
B.
DDoS
C.
Brute force
D.
Rogue AP
A network technician is performing a wireless survey in the office and discovers a device that was
not installed by the networking team. This is an example of which of following threats?
A network technician is performing a wireless survey in the office and discovers a device that was
not installed by the networking team. This is an example of which of following threats?
A.
Bluesnarfing
B.
DDoS
C.
Brute force
D.
Rogue AP