A Corporate Security Officer (CSO) asks that a wireless risk assessment be completed. Which of the following threats should be taken into account?
(Select TWO).
A. Rogue access point
B. New employee
C. Firewall
D. NAT
E. Warpathing
A Corporate Security Officer (CSO) asks that a wireless risk assessment be completed. Which of the following threats should be taken into account?
(Select TWO).
A. Rogue access point
B. New employee
C. Firewall
D. NAT
E. Warpathing