What technique can an attacker use to search for unprotected home wireless signals from an automobile or on foot using a portable computing device?

What will be an ideal response?

An attacker can use the war driving technique to identify unprotected home wireless networks.

Computer Science & Information Technology

You might also like to view...

When the logo is inserted in a form or report that includes a logo placeholder, the Size Mode property is set to ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

In ________, the selected format is applied to a cell if the cell content makes the specified condition true

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology