This is an example of which of following threats?

A network technician is performing a wireless survey in the office and discovers a device that was not installed by the networking team.

This is an example of which of following threats?
A . Bluesnarfing
B . DDoS
C . Brute force
D . Rogue AP

Answer: D

Explanation:

A rogue access point is when a wireless access point is located on a network without the administrator being awareof it. Therefore, if the device was not installed by the networking team, the administrator would not know about it being there.

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments