PrepAway - Latest Free Exam Questions & Answers

Which of the following terms refers to the access of a wireless Internet connection…

Which of the following terms refers to the access of a wireless Internet connection by bringing one’s
own computer within the range of another’s wireless connection, and using that service without the
subscriber’s explicit permission or knowledge?

PrepAway - Latest Free Exam Questions & Answers

A.
Samhain

B.
Snooping

C.
Piggybacking

D.
Vampire tap

Explanation:
Piggybacking is a term used to refer to access of a wireless internet connection by bringing one’s
own computer within the range of another’s wireless connection, and using that service without the
subscriber’s explicit permission or knowledge. It is a legally and ethically controversial practice, with
laws that vary in jurisdictions around the world.

Answer A is incorrect. Samhain is an open source multi-platform application that is used for
checking the integrity of centralized files and for detecting host-based intrusion on POSIX systems
(Unix, Linux, Cygwin/Windows). Although it can be used to monitor a single host, it is designed to
monitor multiple hosts with potentially different operating systems from a central location. Samhain
can therefore be configured as a client/server application to monitor many hosts on a network from
a single central location.

Answer D is incorrect. A vampire tap is a cable connection that is made with a unit that clamps onto
and bites into the cable. Vampire taps are often used to attach thick Ethernet transceivers to the
coaxial cable. Without a vampire tap, the cable has to be cut and connectors have to be attached to
both ends.

Answer B is incorrect. Snooping is an activity of observing the content that appears on a computer
monitor or watching what a user is typing. Snooping also occurs by using software programs to
remotely monitor activity on a computer or network device. Hackers or attackers use snooping
techniques and equipment such as keyloggers to monitor keystrokes, capture passwords and login
information, and to intercept e-mail and other private communications. Sometimes, organizations
also snoop their employees legitimately to monitor their use of organizations’ computers and track
Internet usage.


Leave a Reply