When you decide to use your neighbor's open wireless network without permission, you are ________.

A) hacking
B) trolling
C) wardriving
D) piggybacking


Answer: D) piggybacking

Computer Science & Information Technology

You might also like to view...

Building blocks ensure consistency in:

A) colors, fonts, and effects. B) format and structure. C) colors and format. D) structure and effects.

Computer Science & Information Technology

When configuring a switch to connect to a router that is being configured with a ROAS configuration, which Cisco IOS command must be entered on the interface to ensure that the link forms a trunk?

A) switchport mode trunk B) switchport mode dynamic desirable C) switchport mode access D) switchport mode trunk router

Computer Science & Information Technology

For the

A. selected B. name C. label D. value

Computer Science & Information Technology

A smart chipĀ is an authentication component, similar to a dumb card, that contains a computerĀ chip to verify and validate several pieces of information instead of just a PIN. __________

Answer the following statement true (T) or false (F)

Computer Science & Information Technology