1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
algol13
3 years ago
12

Which of the following hacker attacks against wireless networks are virtually undetectable?

Computers and Technology
1 answer:
Ede4ka [16]3 years ago
7 0

Answer: A. passive attacks

Explanation:

Passive attack is a type of attack where by a system is tracked and scanned to determine how vulnerable it is and to also detect open port. The major purpose of a passive attack on a network is to gain access to the information of the target without altering the data.

A passive attack on a network may not be necessarily malicious, it is a type of network attack that is very difficult to detect.

Methods of carrying out passive attacks.

•War driving: scanning of networks is carried out to detect Wi-Fi that are vulnerable.

•Dumpster driving: Attackers or intruders search for information from discarded computers and

other gadgets, those information can help to attack a network.

You might be interested in
Creating parts that are interchangeable in manufacturing terms is key to the ____ line
denis-greek [22]

Answer:

Assembly line.

Explanation:

The interchangeable parts was a game-changing concept for the manufacturing industry during the Industrial Revolution.

It was first introduced by Eli Whitney, also the inventor of the Cotton Gin, and later was perfected by Henry Ford, who was the first to create a continuous moving assembly line. The Interchangeable parts are identical pieces created from a master model and are so similar to each other, that they can fit into any line of production of the same kind.

Thanks to these advances, the manufacturing process across all industries could be now faster, more cost-efficient, and profitable.

7 0
3 years ago
When building systems, the only two entities that constitute software engineering are people and process.
VLD [36.1K]

Answer: False

Explanation: Software engineering is the designing, analyzing, creating the software application as per the requirement of the user. The programming languages is the base for the designing of the application the software engineering field.

At the time of building system ,there is the requirement of many resources for the development.There is the requirement of the software skills, programming knowledge, resources and tools for the working and designing.Thus, there are different resources, people,skills processes, problem solving skill etc required for the building of the system.

7 0
3 years ago
Define quality control​
tangare [24]

Quality control is a system of maintaining standards in manufactured products by testing a sample of the output against the specification.

8 0
3 years ago
I am trying to test out the software Classroom relay and I am just ask if there is any way kids can stop Classroom relay form se
Ratling [72]

Answer:

just don't share your screen in the class or if your a teacher just call them out

Explanation:

8 0
2 years ago
Read 2 more answers
What is the fundamental purpose of sentiment analysis on social media?​
Rzqust [24]

Answer:

A social media sentiment analysis tells you how people feel about your brand online. Rather than a simple count of mentions or comments, sentiment analysis considers emotions and opinions. It involves collecting and analyzing information in the posts people share about your brand on social media.

Explanation:

8 0
3 years ago
Other questions:
  • g The reciprocal Fibonacci constant ψ is defined by the infinite sum: ψ=∑n=1 [infinity] 1 Fn Where Fn are the Fibonacci numbers
    7·1 answer
  • What does using indirect quotations allow a writer to do?
    7·2 answers
  • What authentication protocol is ticket-based and is used by windows computers that are members of an active directory domain?
    13·1 answer
  • Which does plug-and-play refer to?
    13·2 answers
  • Select the correct answer.
    15·1 answer
  • doubleIt is a function that takes one argument and returns no value . The argument is a pointer to int . The function doubles th
    9·1 answer
  • A ____ object is used to hold data that is retrieved from a database via the OleDbDataAdapter connection. a. DataRecord b. DataS
    12·2 answers
  • WHO SAYS BUP ALL THE TIME ​
    8·1 answer
  • Which data type is -7
    13·1 answer
  • Tamera was responding to a complaint that one of the employees is having problems with the wired network connection on their lap
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!