In a(n) __________ situation, a wireless device is configured to appear to be a legitimate access point, enabling the operator to steal passwords from legitimate users and then penetrate a wired network through a legitimate wireless access point.

A. malicious association
B. identiy theft
C. network injection
D. ad hoc network


A. malicious association

Computer Science & Information Technology

You might also like to view...

An array's size declarator must be a __________ with a value greater than __________.

a. number, one b. number, zero c. constant integer expression, zero d. variable, -1 e. None of these

Computer Science & Information Technology

The ____ panel houses all the layers in a document and offers you many options for manipulating those layers.

A. Tools B. Applications C. Layers D. Options

Computer Science & Information Technology

The correct statement to use to pop an element from a stack (implemented as a linked list) is _____________ .

a. head = head->link; b. head = NULL; c. last = head; d. last->link = new; e. head->link = new;

Computer Science & Information Technology

Which action is commonly used to move objects and resize windows?

A) click B) right-click C) drag D) restore down

Computer Science & Information Technology