Answer:
Employers are allowed to check the number of keystrokes that word processors enter during the day.
Explanation:
An employer is authorized to monitor the activity of its employee when:
- The employee authorizes it.
- The employer owns the system to be used.
- Surveillance is necessary for a strictly professional purpose.
By analyzing the keys pressed per day, the employer can determine the performance provided by its employees, and if they use the company's resources, for non-work purposes.
Answer:
A. Rogue access point
Explanation:
A rogue access point is defined as a wireless access point installed on a secure network infrastructure without consent of the owner of the network or without due authorization. While this can sometimes be added by a malicious attacker, it is most commonly set up by employees with the desire to have wireless access even when there is any available.
In the question, there are three wireless networks, but on scanning, five wireless networks were found, hence they are rogue access point.
The left side because the right side of the brain handles stuff more on the line of shapes and objects
<span>There are some network modeling tools that can scan the existing network.</span>