A __________ attack occurs when an attacker continually bombards a wireless access point or some other accessible wireless port with various protocol messages designed to consume system resources.
Fill in the blank(s) with the appropriate word(s).
denial of service (DoS)
Computer Science & Information Technology
You might also like to view...
The process of pressing and releasing the left mouse button two times in rapid succession is known as ________
A) double-clicking B) clicking C) dragging D) right-clicking
Computer Science & Information Technology
When used with JavaScript, the current window is referred to as the ________
Fill in the blank(s) with correct word
Computer Science & Information Technology