Steganography is used to hide malware and botnets on publicly available in graphics on image hosting sites. True False Question 7 24 pts Match the name in the left column with the description from the right column that best fits it. Piggybacking [ Choose ] An unsecured public wireless network with unsecured file sharing could allow an intruder to access files made available for sharing. Malicious actors use analysis tools to interceept sensitive information War- driving Malicious actors glance over your shoulder to see what you type to learn sensitive or personal information. Someone with a wireless-enabled computer that is in range of your access point can use your connection The act of of driving around a city or neighborhood with a wireless-equipped computer searching for unsecured wireless networks. Evil twin attack An intruder gathers information about a public network's access point and impersonates it. Wireless sniffing Unauthorized access Shoulder surfing.