Short Answer
Match each item with a statement below.
a.Sam Spade
f.NetStumbler
b.Wget
g.AirSnare
c.Nmap "Idle scanning" option
h.Aircrack-ng
d.Firewalk
i.Wireshark
e.XProbe2
-Monitors the airwaves for any new devices or access points.
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q27: The most realistic type of penetration test
Q28: A(n) _ vulnerability scanner listens in on
Q29: Organizations are safe from sniffer attacks when
Q30: The printf (user_input); command in C has
Q31: Explain the two points administrators should remember
Q33: Why can the failure to validate how
Q34: Describe how the criticality of the affected
Q35: Protocol analyzers are commonly referred to as
Q36: Match each item with a statement below.<br>a.Sam
Q37: Match each item with a statement below.<br>a.Sam