take computers with wireless connections through an area and search for unprotected wireless networks, and then monitor and intercept wireless traffic on unsecured wireless networks. group of answer choices phishers drive-by sniffers pretexters keyloggers