Take a look at the situation below and then respond to the questions that follow about wireless and mobile security. Nonhlanhla would want wifi connectivity in the staff break area and conference room adjacent to her office, as well as in her office itself. Her request for a wireless network, on the other hand, is denied by her employer's information technology team. After considering her options, Nonhlanhla decides to take matters into her own hands. She purchases a low-cost consumer wireless router, which she takes into her workplace and connects to the wired network, thus giving wireless access to the workers in her immediate vicinity. List any two tools that you may be able to use to figure out what Nonhlanhla has surreptitiously placed on your computer.
Take a look at the situation below and then respond to the questions that follow about wireless and mobile security.
Nonhlanhla would want wifi connectivity in the staff break area and conference room adjacent to her office, as well as in her office itself. Her request for a wireless network, on the other hand, is denied by her employer's information technology team. After considering her options, Nonhlanhla decides to take matters into her own hands. She purchases a low-cost consumer wireless router, which she takes into her workplace and connects to the wired network, thus giving wireless access to the workers in her immediate vicinity.
List any two tools that you may be able to use to figure out what Nonhlanhla has surreptitiously placed on your computer.
Step by step
Solved in 4 steps