Multiple Choice
This is used to identify rogue modems (or by hackers to identify targets) .
A) War chalking
B) War dialing
C) War driving
D) none of the above
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q30: The most common input-related vulnerability is<br>A) buffer
Q39: If the time an attacker takes to
Q43: On February 14,2008,students enrolled in an economics
Q44: Which of the following preventive controls are
Q49: Which of the following is not a
Q50: This protocol specifies the structure of packets
Q51: It was 9:08 A.M.when Jiao Jan,the Network
Q58: Compatibility tests utilize a(n)_,which is a list
Q94: Multi-factor authentication<br>A)involves the use of two or
Q100: Which of the following is not one