Which type of DoS generates a flood of EAPOL messages requesting 802.1X authentication?

a. Authentication flood attack
b. Deauthentication flood attack
c. Network jamming attack
d. Equipment destruction attack


ANS: A

Computer Science & Information Technology

You might also like to view...

A method containing a behavior that occurs in response to an event is called a(n) ____.

A. constructor B. accessor C. handler D. mutator

Computer Science & Information Technology

By default, the Calendar Work Week is set for ____.

A. Monday through Sunday B. Monday through Saturday C. Sunday through Saturday D. Monday through Friday

Computer Science & Information Technology

The Copy button copies the contents and format of the source area to the ____, a reserved place in the computer's memory.

A. ribbon B. clipboard C. folder D. file

Computer Science & Information Technology

Systems development is separated from data processing activities because failure to do so

A. weakens database access security B. allows programmers access to make unauthorized changes to applications during execution C. results in inadequate documentation D. results in master files being inadvertently erased

Computer Science & Information Technology