Multiple Choice
________ take computers with wireless connections through an area and search for unprotected wireless networks, and then monitor and intercept wireless traffic on unsecured wireless networks.
A) Keyloggers
B) Pretexters
C) Wardrivers
D) Phishers
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q3: Natural disasters present the largest risk for
Q59: Define pretexting, phishing, spoofing, and sniffing.
Q84: Unauthorized data disclosure is possible due to
Q85: Which of the following statements is true
Q87: A _ is a person or an
Q88: When an employee is terminated, IS administrators
Q90: Which of the following is likely to
Q91: Mark is transferring funds online through the
Q93: Kate was among the top ten applicants
Q94: _ are viruses that masquerade as useful