IS management recently replaced its existing wired local area network (LAN) with a wireless
infrastructure to accommodate the increased use of mobile devices within the organization. This will
increase the risk of which of the following attacks?

A.
Port scanning
B.
Back door
C.
Man-in-the-middle
D.
War driving
Explanation:
A war driving attack uses a wireless Ethernet card, set in promiscuous mode, and a powerful antenna
to penetrate wireless systems from outside. Port scanning will often target the external firewall of
the organization. A back door is an opening leftin software that enables an unknown entry into a
system. Man-in-the-middle attacks intercept a message and either replace or modify it.