(TCO 3) A programming project leader connects wirelessly to the company network using a cell phone. He then configures the cell phone to act as a wireless access point that will allow the new contractors to connect to the company network. Which type of security threat best describes this situation?

a. rogue access pointb. spoofingc. denial of serviced. cracking

Respuesta :

Answer:

a. rogue access point

Explanation:

Rogue access point -

It is the wireless access point , which can be installed in the computer network without legal authorization , is referred to as rogue access point.

The point can be installed by the employee or any hacker for any illegal malcius attack practice .

Hence , from the given information of the question,

The correct term is a. rogue access point .