Which of the following wireless technologies is LEAST likely to be intercepted by a third party?
A. NFC
B. Bluetooth
C. WiFi
D. Cellular
Answer: A. NFC
Computer Science & Information Technology
You might also like to view...
NIST SP 800-90, IEEE 802.11i, and TLS/WTLS are three ____________ based on HMAC.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
Which statement is false?
a. SortedSet extends Set. b. Class SortedSet implements TreeSet. c. When a HashSet is constructed, it removes any duplicates in the Collection. d. By definition, a Set object does not contain any duplicates.
Computer Science & Information Technology
What RFC defines the DNS resource record types?
A. RFC 1100 B. RFC 1183 C. RFC 1918 D. RFC 2311
Computer Science & Information Technology