Which wireless network penetration utility implements deauthentication DoS attacks against 802.11 protocol?

a. Kismet
b. Void11
c. THC-wardrive
d. Airsnarf


ANS: B

Computer Science & Information Technology

You might also like to view...

The _________ of a class are also called the public services or the public interface of the class.

a) public constructors b) public instance variables c) public methods d) All of the above

Computer Science & Information Technology

To obtain form controls designed for creating specific types of forms, you can visit the Adobe Mall, a central storage location on the Adobe website for program add-ons.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

To change the text orientation from portrait to landscape and back again, you add a section ________ before and after the landscape-oriented text

A) break B) terminator C) indicator D) marker

Computer Science & Information Technology

PowerPoint's ________ make it possible to move back and forth between slides and go to the end of a presentation

A) plotting aids B) navigation tools C) locator links D) transition effects

Computer Science & Information Technology