TEMPEST is a hardware for which of the following purposes?
A.
Eavedropping
B.
Social engineering
C.
Virus scanning
D.
Firewalling
E.
None of the choices.
Explanation:
Any data that is transmitted over a network is at some risk of being eavesdropped, or even modified by a
malicious person. Even machines that operate as a closed system can be eavesdropped upon via monitoring
the faint electromagnetic transmissions generated by the hardware such as TEMPEST.