Multiple Choice
Hackers use ____ programs to monitor activity on a wireless network in order to obtain personal information that unsuspecting users might transmit.
A) bloodhound
B) sniffer
C) Web bug
D) pharming
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q81: With WEP encryption, the key being used
Q82: In 1994, cellular phone carriers created the
Q83: A security problem associated with Bluetooth devices
Q84: MATCHING<br>-technology that can send data via light
Q85: To access the Internet using a WWAN,
Q87: The following is an example of hacking:
Q88: Like most people of her generation, Martha
Q89: According to the text, _ is a
Q90: A collection of devices connected via Bluetooth
Q91: <img src="https://d2lvgg3v3hfg70.cloudfront.net/TB5447/.jpg" alt=" -In the accompanying