Multiple Choice
________ take computers with wireless connections through an area and search for unprotected wireless networks, and then monitor and intercept wireless traffic on unsecured wireless networks.
A) Keyloggers
B) Pretexters
C) Drive-by sniffers
D) Phishers
Correct Answer:

Verified
Correct Answer:
Verified
Q12: _ involve the people and procedure components
Q20: Data safeguards protect computer hardware from external
Q21: Drive-by sniffers monitor and intercept wireless traffic
Q25: A _ examines each part of a
Q48: Describe the magnitude of security problems in
Q53: _ refers to an organization-wide function that
Q56: Packet-filtering firewalls _.<br>A)can filter both inbound and
Q68: Secure Sockets Layer (SSL) is a protocol
Q81: Which of the following is a personal
Q96: _ occurs through human error when employees