__________ presents a threat to wireless communications, and is therefore a practice that makes it prudent to use a wireless encryption protocol to prevent unauthorized use of your Wi-Fi network.

Fill in the blank(s) with the appropriate word(s).


War driving

Computer Science & Information Technology

You might also like to view...

Describe the different modelling notations in the UML.

What will be an ideal response?

Computer Science & Information Technology

The desktop background contains the Start button and the notification area

Indicate whether the statement is true or false

Computer Science & Information Technology

What are some of the features and tools provided by antispyware products?

What will be an ideal response?

Computer Science & Information Technology

What is used to tell the compiler where it can find the definitions of keywords and classes?

A. linker B. $keyword statement C. using directive D. IDE

Computer Science & Information Technology