30.4k views
3 votes
(TCO 3) A programming project leader connects wirelessly to the company network using a cell phone. He then configures the cell phone to act as a wireless access point that will allow the new contractors to connect to the company network. Which type of security threat best describes this situation?

a. rogue access pointb. spoofingc. denial of serviced. cracking

1 Answer

3 votes

Answer:

a. rogue access point

Step-by-step explanation:

Rogue access point -

It is the wireless access point , which can be installed in the computer network without legal authorization , is referred to as rogue access point.

The point can be installed by the employee or any hacker for any illegal malcius attack practice .

Hence , from the given information of the question,

The correct term is a. rogue access point .

User AlexVogel
by
6.4k points