An attacker spoofs frames to prevent a client from remaining connected to the WLAN. What type of an attack is this?

A. RF jamming
B. man-in-the-middle
C. hijacking
D. denial of service


Answer: D

Computer Science & Information Technology

You might also like to view...

Which of the following is NOT considered a commonly-used chart type?

A) Bar chart B) Pie chart C) Line chart D) XY scatter chart

Computer Science & Information Technology

When creating a chart, the cells located in the blue range finder are the ________

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The ____ layer style fills the layer content with a pattern.

a. Color Overlay b. Pattern Overlay c. Gradient Overlay d. Drop Shadow

Computer Science & Information Technology

Megan decides that she wants to protect her document by restricting who can view and edit it. What are two things she can do to protect her document?

What will be an ideal response?

Computer Science & Information Technology