After a user performed a war driving attack, the network administrator noticed several similar markings where WiFi was available throughout the enterprise. Which of the following is the term used to describe these markings?

A. IV attack
B. War dialing
C. Rogue access points
D. War chalking


Answer: D. War chalking

Computer Science & Information Technology

You might also like to view...

Bits 8-11 of a traditional IBM mainframe’s PSW hold the __________.

a. protection key b. task’s state c. next instruction to be executed d. interrupt mask

Computer Science & Information Technology

To move files from one folder to another, you can use the drag method

Indicate whether the statement is true or false

Computer Science & Information Technology

The PCI expansion slot is used as a general-purpose slot type among many different manufactures and devices

Indicate whether the statement is true or false

Computer Science & Information Technology

_______ applications provide optimal information when they encompass customer support, marketing, and sales.

A. SCM B. CRM C. Supply chain D. All of the above

Computer Science & Information Technology