Which of the following is where an unauthorized device is found allowing access to a network?
A.
Bluesnarfing
B.
Rogue access point
C.
Honeypot
D.
IV attack
Which of the following is where an unauthorized device is found allowing access to a network?
Which of the following is where an unauthorized device is found allowing access to a network?
A.
Bluesnarfing
B.
Rogue access point
C.
Honeypot
D.
IV attack