Some attackers might create a peer-to-peer network that connects a wireless device directly to another wireless device, such as the victim's laptop directly to the attacker's laptop. What is this type of network called?

A. wireless
B. access
C. link
D. ad hoc


Answer: D

Computer Science & Information Technology

You might also like to view...

What is the difference between tracking and leading?

What will be an ideal response?

Computer Science & Information Technology

When information is sent from an HTML page to an applet, the information is passed in HTML ____ tags.

A. markup B. parameter C. associative D. external

Computer Science & Information Technology

Messages are known as ____ in C.

A. characters B. text C. banners D. strings

Computer Science & Information Technology

To export the site definition file to another location, you should open the ____ dialog box.

A. Manage Sites B. Export Sites C. Site Definitions D. Site Options

Computer Science & Information Technology