Piggybackers are those who ________

A) send spam e-mail messages
B) infect networks with worms
C) connect to a wireless network without the owner's permission
D) launch a denial-of-service attack against your network


C

Computer Science & Information Technology

You might also like to view...

____ are important in procurement operations, because they enforce oversight and control and they let the customer coordinate contract review activities, interfaces, and communication with the supplier organization.

A. Audits B. Assessments C. Reviews D. Certifications

Computer Science & Information Technology

When editing someone else's comment, it is a good practice to:

A) contact the lead author and discuss any proposed changes to the comment. B) ask the person for his or her permission before making any changes to the comment. C) make the changes to the document and notify the person of your changes. D) add your name or initials to any changes that you make to the comment.

Computer Science & Information Technology

By default, the gap between columns is ________ inch

A) 0.25 B) 0.5 C) 0.75 D) 1.0

Computer Science & Information Technology

Virtual servers use an internal Ethernet switch concept called the ________

A) vBridge B) vHub C) vRouter D) vSwitch

Computer Science & Information Technology