B. They can see all unencrypted data that crosses the system.
Here's an explanation:
B. They can see all unencrypted data that crosses the system: Wireless technology providers, such as those managing Wi-Fi or cellular networks, can potentially access unencrypted data that passes through their systems. This is because unencrypted data is transmitted in a form that can be intercepted and viewed by those operating the network.
upvoted 1 times
...
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Ssourav
3 months, 2 weeks ago