Wi-Fi networks used in homes and public hotspots use the ________

A) W3C standards
B) IEEE 802.11 standards
C) POP protocols
D) SMTP protocols

B

Computer Science & Information Technology

You might also like to view...

Conducting business transactions online is known as ________

A) disintermediation B) encryption C) e-commerce D) SSL

Computer Science & Information Technology

____ uses influence and persuasion to deceive people by convincing them that the social engineer is someone he isn't, or by manipulation.?

A. ?Network enumeration B. ?Network penetration C. ?Social enumeration D. ?Social engineering

Computer Science & Information Technology