A network technician is doing a wireless audit and finds an SSID that does not match the company's SSID. The company uses the SSID of ABC123, and the SSID the technician found is Default. Which of the following threats did the network technician find?
A. AP isolation
B. DDoS
C. Evil twin
D. Rogue AP
Answer: D. Rogue AP
You might also like to view...
Which of the following statements describes block scope?
a. It begins at the opening { of the class declaration and terminates at the closing }. b. It limits label scope to only the method in which it is declared. c. It begins at the identifier's declaration and ends at the terminating right brace (}). d. It is valid for one statement only.
________ solicits online input such as product ratings from consumers.
A. A quick response code B. Crowdsourcing C. Computer forensics D. Crowdfunding
The result of forgetting to enter the update read is a(n) ____ loop.
A. empty B. temporary C. infinite D. short-circuited
Excel worksheets and workbooks can be saved as Web pages, no matter how large or how many worksheets there are in the file
Indicate whether the statement is true or false