Which of the following is true about wardriving?

A. attackers use RF monitor mode
B. the hardware is very expensive
C. the software is very expensive
D. their goal is simply to hijack a connection


Answer: A

Computer Science & Information Technology

You might also like to view...

A USB Y-cable enables two devices to be connected to a single USB port

Indicate whether the statement is true or false

Computer Science & Information Technology

An internet connection speed greater than 25 Mbps.

What will be an ideal response?

Computer Science & Information Technology

The instructions that handle a computer's basic functions when it is powered on are referred to as:

A. cache B. firmware C. RAM D. virtual memory

Computer Science & Information Technology

A new mobile application is being developed in-house. Security reviews did not pick up any major flaws, however vulnerability scanning results show fundamental issues at the very end of the project cycle.Which of the following security activities should also have been performed to discover vulnerabilities earlier in the lifecycle?

A. Architecture review B. Risk assessment C. Protocol analysis D. Code review

Computer Science & Information Technology