Multiple Choice
________ take computers with wireless connections through an area and search for unprotected wireless networks.
A) Sniffers
B) Pretexters
C) Hackers
D) Phishers
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q2: Spyware programs are installed on a user's
Q7: Adware and spyware are similar to each
Q15: A help-desk information system has answers to
Q38: A criticism of biometric authentication is that
Q60: _ is a technique for intercepting computer
Q70: A(n) _ examines the source address, destination
Q76: Existence of accounts that are no longer
Q104: Which of the following is a synonym
Q108: There are no standards for tallying costs
Q114: Which of the following types of encryption