What is an attacker called who typically has a limited skill set on attacking wireless LANs and WANs?
a. Cyber terrorist
b. Whacker
c. Software cracker/hacker
d. System cracker/hacker
ANS: B
Computer Science & Information Technology
You might also like to view...
Specifying a port that is already in use or specifying an invalid port number when creating a DatagramSocket results in a __________.
a. SocketException. b. PortInUseException. c. PortException. d. ConnectException.
Computer Science & Information Technology
When using a Microsoft Access database, select the ________ option under the Provider tab of the Data Link Properties dialog.
a) Microsoft Jet 4.0 OLE DB Provider b) Microsoft OLE DB Provider for Oracle c) Microsoft OLE DB Simple Provider d) Microsoft OLE DB Provider for Access e) None of the above.
Computer Science & Information Technology