Multiple Choice
________ take computers with wireless connections through an area and search for unprotected wireless networks.
A) Wardrivers
B) Pretexters
C) Hackers
D) Phishers
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q94: Explain how defining positions in an organization
Q95: The creation of backup copies of database
Q96: Incident-response plans should provide centralized reporting of
Q97: A _ pretends to be a legitimate
Q98: What should a company store off premise
Q100: Malware protection is an example of a
Q101: Explain how secure sockets layer works when
Q102: _ occurs when a threat obtains data
Q103: Which of the following statements is TRUE
Q104: Which of the following is a synonym