Which of the following is true about wardriving?
A. attackers use RF monitor mode
B. the hardware is very expensive
C. the software is very expensive
D. their goal is simply to hijack a connection
Answer: A
You might also like to view...
A USB Y-cable enables two devices to be connected to a single USB port
Indicate whether the statement is true or false
An internet connection speed greater than 25 Mbps.
What will be an ideal response?
The instructions that handle a computer's basic functions when it is powered on are referred to as:
A. cache B. firmware C. RAM D. virtual memory
A new mobile application is being developed in-house. Security reviews did not pick up any major flaws, however vulnerability scanning results show fundamental issues at the very end of the project cycle.Which of the following security activities should also have been performed to discover vulnerabilities earlier in the lifecycle?
A. Architecture review B. Risk assessment C. Protocol analysis D. Code review