The term ________ refers to using an open wireless network without permission
A) wardriving B) lollygagging C) piggybacking D) ponytailing
C
Computer Science & Information Technology
You might also like to view...
A macro that is saved as part of a report is not available for use in other reports or forms
Indicate whether the statement is true or false
Computer Science & Information Technology
What specific type of tools can assist teams by identifying attacks and indicators of compromise by collecting, aggregating, and correlating log and alert data from routers, firewalls, IDS/IPS, endpoint logs, Web filtering devices, and other security tools?
A. IOS B. DMZ C. IDS D. SIEM
Computer Science & Information Technology