Q6. A business uses Wi-Fi with content filleting enabled. An employee noticed a coworker accessed a blocked sue from a work computer and repotted the issue. While Investigating the issue, a security administrator found another device providing internet access to certain employees. Which of the following best describes the security risk?
The scenario describes an unauthorized device providing internet access, which allows employees to circumvent the company's security policies, specifically content filtering. This device is a rogue access point (AP). A rogue AP is an unauthorized wireless access point connected to a secured network without the administrator's knowledge or permission. It creates a significant security vulnerability by creating a backdoor into the network that bypasses established security controls like firewalls and content filters, as seen in this situation.
Want a timed, scored experience?
Take the full practice test →