A network technician is performing a wireless survey in the office and discovers a device that was not installed
by the networking team. This is an example of which of following threats?

A.
Bluesnarfing
B.
DDoS
C.
Brute force
D.
Rogue AP
Explanation:
A rogue access point is when a wireless access point is located on a network without the administrator being
aware of it. Therefore, if the device was not installed by the networking team, the administrator would not know
about it being there.