This is an example of which of following threats?

A network technician is performing a wireless survey in the office and discovers a device that was not installed by the networking team. This is an example of which of following threats?A . BluesnarfingB . DDoSC . Brute forceD . Rogue APView AnswerAnswer: D Explanation: A rogue access point is...

August 25, 2018 No Comments READ MORE +

Which of the following network infrastructure implementations would be used to support files being transferred between Bluetooth-enabled smartphones?

Which of the following network infrastructure implementations would be used to support files being transferred between Bluetooth-enabled smartphones?A . PANB . LANC . WLAND . MANView AnswerAnswer: A Explanation: PAN stands for Personal Area Network. It is a network of devices in the area of a person typically within a...

August 24, 2018 No Comments READ MORE +