A security administrator notices an unauthorized vehicle roaming the area on company grounds. The security administrator verifies that all network connectivity is up and running and that no unauthorized wireless devices are being used to authenticate other devices; however, the administrator does notice an unusual spike in bandwidth usage. This is an example of which of the following attacks?

A security administrator notices an unauthorized vehicle roaming the area on company grounds. The security administrator verifies that all network connectivity is up and running and that no unauthorized wireless devices are being used to authenticate other devices; however, the administrator does notice an unusual spike in bandwidth usage. This is an example of which of the following attacks?








A. Rogue access point
B. Bluesnarfing
C. Evil twin
D. War driving






Answer: D


Computer Science

Learn More Multiple Choice Question :