What technique can an attacker use to search for unprotected home wireless signals from an automobile or on foot using a portable computing device?

What will be an ideal response?


An attacker can use the war driving technique to identify unprotected home wireless networks.

Computer Science & Information Technology

You might also like to view...

Given the function prototype and variable declarations, which of the following is a valid function call?

int something (int&, float&); // function prototype int p, q; //variable declarations float m; a) cout << something (3, 7.5); b) p = something (p, m); c) cout << something (p + q, m); d) q = something (q, 2.0);

Computer Science & Information Technology

A(n) ____ builds a sorted array by determining where each element should be in the sorted part of the array and inserting it in that position while moving all other sorted elements over one position.

A. selection sort B. bubble sort C. insertion sort D. merge sort

Computer Science & Information Technology

A series of text links across the top or bottom of a webpage is called the ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

The value of the expression 33/10, assuming both values are integral data types, is ____.

A. 0.3 B. 3 C. 3.0 D. 3.3

Computer Science & Information Technology