_________ involves maneuvering in a car with a portable device looking for unsecured Wi-Fi networks to connect to.
A. War driving
B. Wi-Fi piggybacking
C. Cyber steering
D. Virtual sponging
Fill in the blank(s) with the appropriate word(s).
War driving
Rationale: Unauthorized use of a Wi-Fi network is called war driving or Wi-Fi piggybacking, depending on the location of the hacker at the time. War driving involves driving in a car with a portable device looking for unsecured Wi-Fi networks to connect to. See 6-2: Unauthorized Access and Unauthorized Use
You might also like to view...
____________________ is the process of removing part of an image.
Fill in the blank(s) with the appropriate word(s).
To display the Actions Pane Control when the application ____________________, you must code a request to view the Document Actions task pane that is executed when the Word document opens.
Fill in the blank(s) with the appropriate word(s).
The Privacy menu is used to configure privacy options on an iOS device. Which of the following menus is used on an Android device?
a. Connections b. Device c. System d. Personal
One way to get fired quickly is to bragĀ over social media about a new marketing strategy before it has been publicly announced.
Answer the following statement true (T) or false (F)