Searching for unprotected wireless networks is called what?
A. WLAN trolling
B. war driving
C. battle testing
D. wireless fishing
Answer: B
You might also like to view...
In the coding phase, what is the most common verification approach?
A. Penetration testing B. Informal review C. Desk check D. Audit
Creating a Web site that appears to be someone else's Web site in order to obtain financial or other private information is called?
A. Spam B. Social engineering C. Phishing D. Buffer overflow
Which of the following statements declares a Double variable nameddblAverage?
A. Dim dblAverage As Double B. Dim As Double dblAverage C. Const dblAverage As Constant D. Dim dblAverage As Single
An administrator is creating a new vSphere Distributed Switch that will be utilized with a specific vSphere Cluster. The cluster itself contains a mix of ESXi 5.x and 6.x Hosts. Which Distributed Switch version should be created to support this configuration?
A. Distributed Switch: 6.0.0 B. Distributed Switch: 5.0.0 C. Distributed Switch: 5.1.0 D. Distributed Switch: 5.5.0