Jane, a security administrator, identifies a WEP-encrypted WAP on the network that is located at the end of the building. Jane has noticed that it is the most utilized WAP on the network. When trying to manage the WAP, she is unable to gain access. Which of the following has MOST likely happened to the WAP?
A. The WAP is under an IV attack
B. The WAP's MAC address has been spoofed
C. The WAP is a rogue access point
D. The WAP was victim to a bluejacking attack
Answer: C. The WAP is a rogue access point
Computer Science & Information Technology
You might also like to view...
When you access the Internet, you connect to the largest computer network in the country
Indicate whether the statement is true or false
Computer Science & Information Technology
To find the number of elements in the cellPhones array, type ____.
A. cellPhones.size() B. cellPhones.size C. cellPhones.length D. cellPhones.length()
Computer Science & Information Technology