In which of the following types of attack does an attacker exploit the carrier-sense multiple access with collision avoidance (CSMA/CA) clear channel assessment (CCA) mechanism to make a channel appear busy?

A. Beacon flood
B. Denial of service
C. Access point theft
D. EAP failure


Answer: B. Denial of service

Computer Science & Information Technology

You might also like to view...

Which of the following is NOT a cell margin option?

A) Wide B) Narrow C) Alignment D) None

Computer Science & Information Technology

A flaw in the protection system of many operating systems is argument passing. Often, a common shared stack is used by all nested routines for arguments as well as for the remainder of the context of each calling process. (a) Explain what vulnerabilities this flaw presents. (b) Explain how the flaw can be controlled. The shared stack is still to be used for passing arguments and storing context

What will be an ideal response?

Computer Science & Information Technology

?Text files open in ____ by default.

A. ?WordPad B. ?Writer C. ?Microsoft Word D. ?Notepad

Computer Science & Information Technology

Performance objectives for a training session should be ____.

A. achievable B. measurable C. verifiable D. flexible

Computer Science & Information Technology