Multiple Choice
________ take computers with wireless connections through an area and search for unprotected wireless networks and then monitor and intercept wireless traffic at will.
A) Drive-by spoofers
B) Pretexters
C) Drive-by sniffers
D) Phishers
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q34: _ is the term used to denote
Q40: Security policies must not depend on whether
Q42: _ are false targets for computer criminals
Q71: Data safeguards are measures used to protect
Q71: List various personal security safeguards.
Q79: Sniffing occurs when an intruder uses another
Q92: What is a virus? Differentiate between Trojan
Q96: Employee termination is a potential security threat
Q96: _ occurs through human error when employees
Q119: The existence of accounts that are no