Multiple Choice
A technique in which hackers go to known business traveler locations like airports and set up access points (look like regular wireless networks) through their laptops to the Internet is called _____.
A) social engineering
B) spoofing
C) phishing
D) wartrapping
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q3: The most difficult aspect of detecting e-business
Q3: E-mail messages and Web visits can be
Q4: Firms specializing in _ try to gain
Q4: In an electronic environment, no other control
Q6: What is spoofing?<br>A)Using a subtly different Internet
Q6: A hacker sends a database command after
Q7: Which of these is a program that
Q12: _ is the use of unique features
Q13: A (n)_,similar to a trojan horse,installs monitoring
Q24: Which of the following is NOT a