which of following threats?

A network technician is performing a wireless survey in the office and discovers a device that was
not installed by the networking team. This is an example of which of following threats?

A network technician is performing a wireless survey in the office and discovers a device that was
not installed by the networking team. This is an example of which of following threats?

A.
Bluesnarfing

B.
DDoS

C.
Brute force

D.
Rogue AP



Leave a Reply 0

Your email address will not be published. Required fields are marked *