_________ involves maneuvering in a car with a portable device looking for unsecured Wi-Fi networks to connect to.
A. War driving
B. Wi-Fi piggybacking
C. Cyber steering
D. Virtual sponging

Fill in the blank(s) with the appropriate word(s).


War driving

Rationale: Unauthorized use of a Wi-Fi network is called war driving or Wi-Fi piggybacking, depending on the location of the hacker at the time. War driving involves driving in a car with a portable device looking for unsecured Wi-Fi networks to connect to. See 6-2: Unauthorized Access and Unauthorized Use

Computer Science & Information Technology

You might also like to view...

____________________ is the process of removing part of an image.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

To display the Actions Pane Control when the application ____________________, you must code a request to view the Document Actions task pane that is executed when the Word document opens.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The Privacy menu is used to configure privacy options on an iOS device. Which of the following menus is used on an Android device?

a. Connections b. Device c. System d. Personal

Computer Science & Information Technology

One way to get fired quickly is to bragĀ over social media about a new marketing strategy before it has been publicly announced.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology