In which of the following types of attack does an attacker exploit the carrier-sense multiple access with collision avoidance (CSMA/CA) clear channel assessment (CCA) mechanism to make a channel appear busy?
A. Beacon flood
B. Denial of service
C. Access point theft
D. EAP failure
Answer: B. Denial of service
You might also like to view...
Which of the following is NOT a cell margin option?
A) Wide B) Narrow C) Alignment D) None
A flaw in the protection system of many operating systems is argument passing. Often, a common shared stack is used by all nested routines for arguments as well as for the remainder of the context of each calling process. (a) Explain what vulnerabilities this flaw presents. (b) Explain how the flaw can be controlled. The shared stack is still to be used for passing arguments and storing context
What will be an ideal response?
?Text files open in ____ by default.
A. ?WordPad B. ?Writer C. ?Microsoft Word D. ?Notepad
Performance objectives for a training session should be ____.
A. achievable B. measurable C. verifiable D. flexible