IS management recently replaced its existing wired local area network (LAN) with a wireless
infrastructure to accommodate the increased use of mobile devices within the organization. This
will increase the risk of which of the following attacks?
A war driving attack uses a wireless Ethernet card, set in promiscuous mode, and a powerful
antenna to penetrate wireless systems from outside. Port scanning will often target the external
firewall of the organization. A back door is an opening leftin software that enables an unknown
entry into a system. Man-in-the-middle attacks intercept a message and either replace or modify it.