____ is a passive method of receiving WLAN signals.

A. CDMA
B. RFMON
C. SDIO NOW!
D. Sled


Answer: B

Computer Science & Information Technology

You might also like to view...

When you ___________________ a number, you drop the factional part.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

An attacker sets up a look-alike Wi-Fi network, tempting unsuspecting users to connect with the attacker's Wi-Fi network instead. What is this called?

A. evil twin B. ad hoc network C. VPN D. guest network

Computer Science & Information Technology

Files that have an extension of .odp were created using ________

A) Impress B) Writer C) Calc D) Base

Computer Science & Information Technology

Expanded outline view displays slide icons and slide titles

Indicate whether the statement is true or false

Computer Science & Information Technology