
________ take computers with wireless connections through an area and search for unprotected wireless networks and then monitor and intercept wireless traffic at will.
A) Keyloggers
B) Pretexters
C) Drive-by sniffers
D) Phishers
Correct Answer:
Verified
Q42: Companies should require vendors and partners to
Q47: _ occurs when someone deceives by pretending
Q50: Which of the following is an example
Q51: When referring to security threats, pretexting, sniffing,
Q52: Which of the following is considered a
Q53: The existence of accounts that are no
Q55: Employee termination is a potential security threat
Q56: _ is a technique for intercepting computer
Q87: If the incident-response plan is not well-prepared,
Q88: Business requirements do not necessitate opening information
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents