A network technician is performing a wireless survey in the office and discovers a device that was not installed by the networking team. This is an example of which of following threats?

A. Bluesnarfing
B. DDoS
C. Brute force
D. Rogue AP

Answer: D. Rogue AP

Computer Science & Information Technology

You might also like to view...

Which of the following is NOT true about synchronization?

A) Backup copies of your files need to be manually created. B) The synchronization process is managed by an application that can be installed on your mobile device or PC. C) The files stored in the cloud service can generally be accessed via a website as well. D) If a device crashes or is damaged, the files stored in the cloud service will be safe.

Computer Science & Information Technology

AppLocker policies permit you to restrict applications according to publisher________ rules, which limit application execution according to the application's digital signature

Fill in the blank(s) with correct word

Computer Science & Information Technology