Short Answer
An attacker's use of a laptop while driving around looking for open wireless connections is often called war ____________________.
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q12: In some instances, risk is acknowledged as
Q13: Inventory characteristics for hardware and software assets that
Q14: An effective information security governance program requires
Q15: The _ is a statement of the
Q16: A general guideline for performance of hard
Q18: _, a level beyond vulnerability testing, is
Q19: The NIST SP 800-100 Information Security Handbook provides<u> technical</u>
Q20: List the four steps to developing a
Q21: The _ tester's ultimate responsibility is to
Q22: As the help desk personnel screen problems,