PrepAway - Latest Free Exam Questions & Answers

which of following threats?

A network technician is performing a wireless survey in the office and discovers a device that was not installed by the networking team.
This is an example of which of following threats? aware of it. Therefore, if the device was not installed by the networking team, the administrator would not know about it being there.

PrepAway - Latest Free Exam Questions & Answers

A.
Bluesnarfing

B.
DDoS

C.
Brute force

D.
Rogue AP

Explanation:
A rogue access point is when a wireless access point is located on a network without the administrator being


Leave a Reply