A disgruntled employee is using some free wireless networking tools to determine information about the enterprise wireless networks. This person is planning on using this information to hack the wireless network. What type of attack is this?
- access
- DoS
- Trojan horse
- reconnaissance
Explanation & Hint:
The type of attack being described is reconnaissance. This is a type of attack where an attacker gathers information about a network with the intent to circumvent its security controls. It is often considered a preliminary step that can lead to a more serious attack once the attacker has gained sufficient information about network vulnerabilities. |