A __________ attack occurs when an attacker continually bombards a wireless access point or some other accessible wireless port with various protocol messages designed to consume system resources.

Fill in the blank(s) with the appropriate word(s).


denial of service (DoS)

Computer Science & Information Technology

You might also like to view...

MIDI files contain a set of instructions for synthesizing music which are called MIDI ____.

A. addresses B. e-mails C. sound bytes D. messages

Computer Science & Information Technology

Which type of firewall only examines the IP and port information to determine if a packet should be allowed through?

What will be an ideal response?

Computer Science & Information Technology

A technician is reconfiguring a mobile e-mail client for offline mode. Which of the following describes the expected time it will take to synchronize the account with the e-mail server?

a. It will depend on the time when the account was last synchronized b. It will depend on the SMTP settings of the e-mail server c. There is no offline mode for e-mail d. It will depend on the POP settings of the e-mail server

Computer Science & Information Technology

_____ can be broken out into subfields that have meaning.

A. Atomic data B. Composite data C. Static data D. Scalar data

Computer Science & Information Technology