After a user performed a war driving attack, the network administrator noticed several similar
markings where WiFi was available throughout the enterprise. Which of the following is the term
used to describe these markings?
A.
IV attack
B.
War dialing
C.
Rogue access points
D.
War chalking