____ is a passive method of receiving WLAN signals.
A. CDMA
B. RFMON
C. SDIO NOW!
D. Sled
Answer: B
Computer Science & Information Technology
You might also like to view...
When you ___________________ a number, you drop the factional part.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
An attacker sets up a look-alike Wi-Fi network, tempting unsuspecting users to connect with the attacker's Wi-Fi network instead. What is this called?
A. evil twin B. ad hoc network C. VPN D. guest network
Computer Science & Information Technology
Files that have an extension of .odp were created using ________
A) Impress B) Writer C) Calc D) Base
Computer Science & Information Technology
Expanded outline view displays slide icons and slide titles
Indicate whether the statement is true or false
Computer Science & Information Technology