What is an attacker called who typically has a limited skill set on attacking wireless LANs and WANs?

a. Cyber terrorist
b. Whacker
c. Software cracker/hacker
d. System cracker/hacker


ANS: B

Computer Science & Information Technology

You might also like to view...

The print() and println() methods each take a single ____ as their argument.

A. Double B. Integer C. Boolean D. String

Computer Science & Information Technology

Identify important factors in the success of logical database design.

What will be an ideal response?

Computer Science & Information Technology

The scope of a variable refers to.

A. when an identifier exists, i.e. its lifespan. B. the range of values a variable can take on. C. where an identifier can be used or referenced. D. the rules for the construction of the identifier for a variable.

Computer Science & Information Technology

A Hyper-V cluster supports from two to eight servers with a 32 or 64-bit architecture.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology