which of following threats?

A network technician is performing a wireless survey in the office and discovers a device that was not installed by the networking team.
This is an example of which of following threats? aware of it. Therefore, if the device was not installed by the networking team, the administrator would not know about it being there.

A network technician is performing a wireless survey in the office and discovers a device that was not installed by the networking team.
This is an example of which of following threats? aware of it. Therefore, if the device was not installed by the networking team, the administrator would not know about it being there.

A.
Bluesnarfing

B.
DDoS

C.
Brute force

D.
Rogue AP

Explanation:
A rogue access point is when a wireless access point is located on a network without the administrator being



Leave a Reply 0

Your email address will not be published. Required fields are marked *