A ____ program creates fake packets and flood the wireless network.

A. MAC
B. packet sniffer
C. packet generator
D. CSMA/CA


Answer: C

Computer Science & Information Technology

You might also like to view...

The ____ handles computer crimes that are categorized as felonies.

A. FBI B. U.S. Secret Service C. U.S. Treasury Department D. Securities and Exchange Commission

Computer Science & Information Technology

In the Sound Byte, we examined a program called Tickle where the programmer used the draw() routine to ________

A) draw a line on the screen B) find the mouse pointer and move the text "tickle" by a random amount C) draw a loop at the location of the mouse pointer D) draw a blank screen to start a new iteration of the sketch

Computer Science & Information Technology

The debugger command ______________ allows you to “peek into the computer” and look at the value of a variable.

a) value b) variable c) print d) peek

Computer Science & Information Technology

The Report ________ section of a report is used for report totals and other summary information

A) Page Header B) Header C) Footer D) Detail

Computer Science & Information Technology