A __________ attack occurs when an attacker continually bombards a wireless access point or some other accessible wireless port with various protocol messages designed to consume system resources.
Fill in the blank(s) with the appropriate word(s).
denial of service (DoS)
You might also like to view...
MIDI files contain a set of instructions for synthesizing music which are called MIDI ____.
A. addresses B. e-mails C. sound bytes D. messages
Which type of firewall only examines the IP and port information to determine if a packet should be allowed through?
What will be an ideal response?
A technician is reconfiguring a mobile e-mail client for offline mode. Which of the following describes the expected time it will take to synchronize the account with the e-mail server?
a. It will depend on the time when the account was last synchronized b. It will depend on the SMTP settings of the e-mail server c. There is no offline mode for e-mail d. It will depend on the POP settings of the e-mail server
_____ can be broken out into subfields that have meaning.
A. Atomic data B. Composite data C. Static data D. Scalar data