A malicious student is blocking mobile devices from connecting to the internet when other students are in the classroom. Which of the following is the malicious student implementing?

A. Removing the AP from the classroom
B. ACL
C. Jamming
D. Firewall
E. IPS


Answer: C. Jamming

Computer Science & Information Technology

You might also like to view...

What are small objects such as text boxes, buttons, and labels that let users interact with the form?

A. Record sources B. Subforms C. User views D. Controls

Computer Science & Information Technology

________ is a network virtualization certification program for application engineers who design, develop, and build business applications and who are looking to leverage the programmability capability of the new open network environment.

A) Cisco Network Programmability Engineer Specialist B) Cisco Network Programmability Design Specialist C) Cisco Business Application Engineer Specialist D) Cisco Network Programmability Developer Specialist

Computer Science & Information Technology

To open the Preferences dialog box in Windows, click ____ on the Menu bar, point to Preferences, and then click a preference category to open the dialog box.

A. File B. Window C. Edit D. Options

Computer Science & Information Technology

____ templates include multiple pages and folders in an organized site structure.

A. Site B. Page C. Style D. Image

Computer Science & Information Technology