________ take computers with wireless connections through an area and search for unprotected wireless networks, and then monitor and intercept wireless traffic on unsecured wireless networks.

________ take computers with wireless connections through an area and search for unprotected wireless networks, and then monitor and intercept wireless traffic on unsecured wireless networks.
A) Keyloggers
B) Pretexters
C) Wardrivers
D) Phishers
E) Tibutors
Answer :

Leave a Comment