Which of the following is true of stingray?

a. It supports operations that require aerial surveillance.
b. It is a national security agency surveillance program that collects Internet data including search histories.
c. It impersonates a cell tower and forces all mobile phones within range to connect to it.
d. It is an airline passenger prescreening program that checks travelers’ personal information.


c. It impersonates a cell tower and forces all mobile phones within range to connect to it.
Stingray is a type of hardware device used to impersonate a cell tower, forcing all mobile phones within range to connect to it. The device can then capture information that can be used to identify and locate users and the phone numbers they call or text.

Computer Science & Information Technology

You might also like to view...

What sorting algorithm can be used to sort a linked list?

A. No sorting algorithm B. Almost any sorting algorithm C. Insertion sort only D. Quicksort only

Computer Science & Information Technology

The ____ helps you design an on-screen form in which you can enter and manipulate data for each record of a database.

A. Record Wizard B. Form Wizard C. Field Wizard D. Database Wizard

Computer Science & Information Technology

[Ctrl][Y] is the quick keystroke for the ____________________ command.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

What are the differences between Dynamic WEP unicast and broadcast keys?

What will be an ideal response?

Computer Science & Information Technology