An employee connects wirelessly to the company network using a cell phone. The employee then configures the cell phone to act as a wireless access point that will allow new employees to connect to the company network. Which type of security threat best describes this situation?
- cracking
- denial of service
- rogue access point
- spoofing
Explanation: Configuring the cell phone to act as a wireless access point means that the cell phone is now a rogue access point. The employee unknowingly breached the security of the company network by allowing a user to access the network without connecting through the company access point. Cracking is the process of obtaining passwords from data stored or transmitted on a network. Denial of service attacks refer to sending large amounts of data to a networked device, such as a server, to prevent legitimate access to the server. Spoofing refers to access gained to a network or data by an attacker appearing to be a legitimate network device or user.
Exam with this question: SRWEv7 Practice Final Exam Answers
Exam with this question: Checkpoint Exam: Threat Actors and Defenders Group Exam
Exam with this question: CyberOps Associate Course Final Exam Answers
Exam with this question: 5.4.2 Wireless Network Communication Quiz
Please login or Register to submit your answer