The term ________ refers to using an open wireless network without permission

A) wardriving B) lollygagging C) piggybacking D) ponytailing

C

Computer Science & Information Technology

You might also like to view...

A macro that is saved as part of a report is not available for use in other reports or forms

Indicate whether the statement is true or false

Computer Science & Information Technology

What specific type of tools can assist teams by identifying attacks and indicators of compromise by collecting, aggregating, and correlating log and alert data from routers, firewalls, IDS/IPS, endpoint logs, Web filtering devices, and other security tools?

A. IOS B. DMZ C. IDS D. SIEM

Computer Science & Information Technology