Which of the following techniques is commonly used by malicious individuals seeking unprotected wireless networks? a. War dialing b. Speed dialing c. War driving d. Speed driving e. Speed scanning If you haven’t done so already, delete all data from the system and install the operating system of your choice. Do not apply any updates or security patches to the operating system. Install the security monitoring tools (e.g., antivirus software, personal firewall, intrusion detection system, etc.) of your choice. Configure the tools to log any attempted attacks, whether successful or not. You may use any tools available to you. If you’re on a limited budget, there are a number of free tools available, such as the F-Prot virus scanners (http://www.f-prot.com/products/home_use/), the ZoneAlarm personal firewall (http://www.zonelabs.com), and Microsoft Internet Connection Firewall.