A technician reports a suspicious individual is seen walking around the corporate campus. The individual is holding a smartphone and pointing a small antenna, in order to collect SSIDs. Which of the following attacks is occurring?
A. Rogue AP
B. Evil Twin
C. Man-in-the-middle
D. War driving
Ans: D. War driving
You might also like to view...
The World Wide Web Consortium has created a set of ____, or specifications, that all browser manufacturers follow.
A. indices B. standards C. sheets D. styles
Software designed for creating images, videos, and music usually offers ways to save your work in compressed file formats.
Answer the following statement true (T) or false (F)
Slides 1, 3, and 5 are contiguous slides
Indicate whether the statement is true or false
Critical Thinking QuestionsCase 1-1Your colleague Frank is editing a friend's novel in Word. To speed up the process, Frank would like to take advantage of the various techniques available for selecting text, and he asks you for help. Which of the following techniques will allow Frank to select an entire sentence? a. click the sentencec. press and hold down the CTRL key and then click the sentenceb. double-click the sentenced. move the mouse to the left of the sentence and then triple-click
What will be an ideal response?