What is war driving?

What will be an ideal response?

Unauthorized use of a Wi-Fi network is called war driving or Wi-Fi piggybacking, depending on the location of the hacker at the time. War driving typically involves driving in a car with a portable computer looking for unsecured Wi-Fi networks to connect to.

Computer Science & Information Technology

You might also like to view...

Which of the following encryption types is the LEAST secure?

A. WPA B. AES C. TKIP D. WEP

Computer Science & Information Technology

____ is a "has-a" relationship.

A. Inheritance B. Encapsulation C. Composition D. Polymorphism

Computer Science & Information Technology