Short Answer
____________ refers to a process used to locate wireless networks that might be vulnerable to attack.
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q10: A term used to describe calling numerous
Q11: Flooding a system with many false connection
Q12: An attack characterized by an explicit attempt
Q13: The process of reviewing logs,records,and procedures to
Q14: Another name for an ethical hacker operating
Q16: What is a technique used to determine
Q17: In addition to mandating federal agencies to
Q18: Which is a technique used to provide
Q19: Encryption and virtual private networks are techniques
Q20: Which is NOT one of the three