What technique can an attacker use to search for unprotected home wireless signals from an automobile or on foot using a portable computing device?
What will be an ideal response?
An attacker can use the war driving technique to identify unprotected home wireless networks.
Computer Science & Information Technology
You might also like to view...
When the logo is inserted in a form or report that includes a logo placeholder, the Size Mode property is set to ________
Fill in the blank(s) with correct word
Computer Science & Information Technology
In ________, the selected format is applied to a cell if the cell content makes the specified condition true
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology