Multiple Choice
________ take computers with wireless connections through an area and search for unprotected wireless networks and then monitor and intercept wireless traffic at will.
A) Drive-by sniffers
B) Drive-by spoofers
C) Pretexters
D) Drive-by phishers
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q32: Denial of service always occurs because of
Q44: A weakness in a security system is
Q46: Digital signatures use public keys to encrypt
Q47: To obtain a measure of probable loss,companies
Q48: Customers do not want to have their
Q50: Organizations should protect sensitive data by storing
Q51: Drive-by sniffers can be prevented from accessing
Q52: With symmetric encryption,both parties use the same
Q54: Key escrow refers to the safety procedure
Q59: _ are viruses that masquerade as useful