(TCO 3) A programming project leader connects wirelessly to the company network using a cell phone. He then configures the cell phone to act as a wireless access point that will allow the new contractors to connect to the company network. Which type of security threat best describes this situation?

a. rogue access pointb. spoofingc. denial of serviced. cracking