Multiple Choice
________ take computers with wireless connections through an area and search for unprotected wireless networks and then monitor and intercept wireless traffic at will.
A) Keyloggers
B) Pretexters
C) Drive-by sniffers
D) Phishers
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q22: _ protect databases and other organizational data.<br>A)Cookies<br>B)Payloads<br>C)Data
Q28: Faulty service excludes problems that result due
Q52: Discuss some human safeguards for employees that
Q53: _ refers to an organization-wide function that
Q62: A Trojan horse is a virus that
Q103: A _ examines each part of a
Q104: Which of the following statements is true
Q109: _ is similar to spyware but it
Q110: _ is a technique for intercepting computer
Q111: Which of the following is a critical