A Corporate Security Officer (CSO) asks that a wireless risk assessment be completed. Which of
the following threats should be taken into account? (Select TWO).
A.
Rogue access point
B.
New employee
C.
Firewall
D.
NAT
E.
Warpathing
Explanation:
A Corporate Security Officer (CSO) asks that a wireless risk assessment be completed. Which of
the following threats should be taken into account? (Select TWO).
A Corporate Security Officer (CSO) asks that a wireless risk assessment be completed. Which of
the following threats should be taken into account? (Select TWO).
A.
Rogue access point
B.
New employee
C.
Firewall
D.
NAT
E.
Warpathing
Explanation: