A ____ constantly monitors the radio frequency (using wireless probes) for attacks.

A. wireless intrusion detection system (WIDS)
B. wireless AP detection system (WADS)
C. rogue AP prevention system (RAPS)
D. rogue AP detection system (RADS)


Answer: A

Computer Science & Information Technology

You might also like to view...

A(n) ____________ is a column that contains unique values generated by the DBMS, usually using a counter.

a. primary key b. identity column c. key column d. generated field

Computer Science & Information Technology

Which of the following is an industry standard that enables a camera to connect directly to a printer?

A) PictBridge B) Shutterfly C) Flickr D) Geotagging

Computer Science & Information Technology

Security issues are not a major concern when working with macros in an Access database

Indicate whether the statement is true or false

Computer Science & Information Technology

A blue line, called a ____ line, that appears when you are dragging a GUI object on a Windows Form object indicates that the object being dragged is horizontally aligned with the object connected by the blue line.

A. key B. base C. hot D. snap

Computer Science & Information Technology