TEMPEST is a hardware for which of the following purposes?

A.
Eavedropping
B.
Social engineering
C.
Virus scanning
D.
Firewalling
E.
None of the choices.
Explanation:
Any data that is transmitted over a network is at some risk of being eavesdropped, or even
modified by a malicious person. Even machines that operate as a closed system can be
eavesdropped upon via monitoring the faint electromagnetic transmissions generated by the
hardware such as TEMPEST.