The informal expression used more often for searching for RF signals is ____.

A. phishing
B. pharming
C. beaconing
D. wardriving


Answer: D

Computer Science & Information Technology

You might also like to view...

Which constants are used to indicate that a ResultSet is scrollable, insensitive to changes and read only?

a. TYPE_SCROLLABLE_INSENSITIVE, CONCUR_READ_ONLY. b. TYPE_SCROLLABLEINSENSITIVE, CONCUR_READONLY. c. TYPE_SCROLL_INSENSITIVE, CONCUR_READ_ONLY. d. TYPE_SCROLL_INSENSITIVE, CONCUR_READONLY.

Computer Science & Information Technology

Packet fragmentation is not normal, and can only occur if an attack has been initiated.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Fast connections that blaze away at speeds over 100 Mbps (100 million bits per second) are called ____ connections.

A. broadband B. DSL C. cable Internet D. dial-up

Computer Science & Information Technology

As with Facebook and other social networks, you can enter your own comments about any individual post

Indicate whether the statement is true or false

Computer Science & Information Technology