
________ take computers with wireless connections through an area and search for unprotected wireless networks, and then monitor and intercept wireless traffic on unsecured wireless networks.
A) Keyloggers
B) Pretexters
C) Wardrivers
D) Phishers
E) Tibutors
Correct Answer:
Verified
Q7: Which of the following usually happens in
Q8: Which of the following is most likely
Q9: Which of the following is considered a
Q10: Which of the following is a sniffing
Q11: In the context of security threats, pretexting,
Q13: _ occurs through human error when employees
Q14: Stan loves collecting stamps. He receives an
Q15: _ is a sophisticated, possibly long-running computer
Q16: Which of the following is considered a
Q17: A person claiming to be from central
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents