After a user performed a war driving attack, the network administrator noticed several similar markings where WiFi was available throughout the enterprise. Which of the following is the term used to describe these markings?
Network Security | |
Compliance and Operational Security | |
Threats and Vulnerabilities | |
Application, Data and Host Security | |
Access Control and Identity Management | |
Cryptography |