Some attackers might create a peer-to-peer network that connects a wireless device directly to another wireless device, such as the victim's laptop directly to the attacker's laptop. What is this type of network called?
A. wireless
B. access
C. link
D. ad hoc
Answer: D
Computer Science & Information Technology
You might also like to view...
What is the difference between tracking and leading?
What will be an ideal response?
Computer Science & Information Technology
When information is sent from an HTML page to an applet, the information is passed in HTML ____ tags.
A. markup B. parameter C. associative D. external
Computer Science & Information Technology
Messages are known as ____ in C.
A. characters B. text C. banners D. strings
Computer Science & Information Technology
To export the site definition file to another location, you should open the ____ dialog box.
A. Manage Sites B. Export Sites C. Site Definitions D. Site Options
Computer Science & Information Technology