The practice of ________ refers to traveling around and searching for open wireless networks
A) piggybacking B) wardriving C) lollygaggiing D) ponytailing
B
Computer Science & Information Technology
You might also like to view...
A set of coordinated pointer shapes that you can assign to different actions is:
A) a mouse scheme. B) a pointer scheme. C) a mouse theme. D) a pointer theme.
Computer Science & Information Technology
Why is a security impact assessment performed as part of a change management process?
A. To find out if sufficient funds have been allocated to the security function B. To review the level of security against the efforts involved in testing change C. To determine the likelihood of downtime or security reduction caused by a potential change D. To assess compliance with regulations
Computer Science & Information Technology