In which type of wireless attack does the attacker cause valid users to lose their connections by sending a forged deauthentication frame to their stations?
A. association flood
B. jamming
C. session hijacking
D. MAC address spoofing
Answer: C
You might also like to view...
Give three examples of servers, other than transaction servers, database servers, and file servers, that might be called by an application server in a distributed transaction processing system.
What will be an ideal response?
When the no service password-encryption command is issued to stop password encryption, which of the following describes the process for decrypting passwords?
A) Encrypted passwords remain encrypted permanently. B) Encrypted passwords are decrypted only when the password is changed. C) All encrypted passwords are decrypted immediately. D) Each encrypted password is decrypted based on its expiration date.
Using the ____, 802.11F specified information that access pointsneed to exchange to support WLAN roaming.
A. AIFSN B. HCCA C. IAPP D. EDCA
In the figure above, which number refers to the layers that are within a group?
A. 1 B. 2 C. 3 D. 4