Multiple Choice
Which of the following is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network?
A) backdoor programs
B) drive-by hacking
C) polymorphic viruses and worms
D) hacker
Correct Answer:

Verified
Correct Answer:
Verified
Q8: Spear phishing is a phishing expedition in
Q98: Worms are computer viruses that wait for
Q246: What is the method or system of
Q247: What is software that, while purporting to
Q248: Where do organizations typically place firewalls?<br>A)between a
Q249: What is the science that studies encryption,
Q250: What are biometrics?<br>A)the traditional security process, which
Q252: A voiceprint is a set of measurable
Q254: Which of the following describes workplace MIS
Q256: What uses a zombie farm, often by