A network technician is performing a wireless survey in the office and discovers a device that was not installed by the networking team.
This is an example of which of following threats? aware of it. Therefore, if the device was not installed by the networking team, the administrator would not know about it being there.
A.
Bluesnarfing
B.
DDoS
C.
Brute force
D.
Rogue AP
Explanation:
A rogue access point is when a wireless access point is located on a network without the administrator being