Multiple Choice
Some perpetrators use a technique called ____ in which they attempt to connect to wireless networks via their notebook computers while driving a vehicle through areas they suspect have a wireless network.
A) cyberforensics
B) war driving
C) war flying
D) wire cruising
Correct Answer:

Verified
Correct Answer:
Verified
Q68: A honeypot is a program designed to
Q69: Some viruses are hidden in _, which
Q70: _ are the moral guidelines that govern
Q71: _ is a program placed on a
Q72: A computer _ is a potentially damaging
Q74: The most common type of license included
Q75: A Web site that uses encryption techniques
Q76: A(n) _ certificate is a notice that
Q77: <img src="https://d2lvgg3v3hfg70.cloudfront.net/TBX8777/.jpg" alt=" Figure 11-3 To
Q78: Content _ is the process of restricting