“When there is a lack of a central point of control.” Which type of Wireless network threat would you classify this under?
(a) Man in the middle attack
(b) Identity Theft
(c) Ad Hoc Networks
(d) Non-Traditional Networks
I have been asked this question in an interview.
My doubt is from Wireless Security topic in portion Wireless Network Security and Network Security Overview of Cryptograph & Network Security