After a user performed a war driving attack, the network administrator noticed several similar markings where WiFi was available throughout the enterprise. Which of the following is the term used to describe these markings?
A. IV attack
B. War dialing
C. Rogue access points
D. War chalking
Answer: D. War chalking
Computer Science & Information Technology
You might also like to view...
Bits 8-11 of a traditional IBM mainframe’s PSW hold the __________.
a. protection key b. task’s state c. next instruction to be executed d. interrupt mask
Computer Science & Information Technology
To move files from one folder to another, you can use the drag method
Indicate whether the statement is true or false
Computer Science & Information Technology
The PCI expansion slot is used as a general-purpose slot type among many different manufactures and devices
Indicate whether the statement is true or false
Computer Science & Information Technology
_______ applications provide optimal information when they encompass customer support, marketing, and sales.
A. SCM B. CRM C. Supply chain D. All of the above
Computer Science & Information Technology