Which of the following wireless technologies is LEAST likely to be intercepted by a third party?

A. NFC
B. Bluetooth
C. WiFi
D. Cellular


Answer: A. NFC

Computer Science & Information Technology

You might also like to view...

NIST SP 800-90, IEEE 802.11i, and TLS/WTLS are three ____________ based on HMAC.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Which statement is false?

a. SortedSet extends Set. b. Class SortedSet implements TreeSet. c. When a HashSet is constructed, it removes any duplicates in the Collection. d. By definition, a Set object does not contain any duplicates.

Computer Science & Information Technology

When a target document resides on another server in the network, use a(n) ____ to locate the document.

A. file path B. URL C. host name D. tag

Computer Science & Information Technology

What RFC defines the DNS resource record types?

A. RFC 1100 B. RFC 1183 C. RFC 1918 D. RFC 2311

Computer Science & Information Technology