This is when an attacker sends a special type of message to the wireless access point with the victim’s MAC address which disconnects the victim’s connection from the AP.
What will be an ideal response?
deauthentication
Computer Science & Information Technology
You might also like to view...
The ________ offers details about changes to a document and removes comment balloons and displays the comments as text only
A) Detailed Summary View B) Reviewing Pane C) Summary Pane D) Track Changes Pane
Computer Science & Information Technology
You can use the mouse to move an image, you cannot use the directional arrow keys
Indicate whether the statement is true or false
Computer Science & Information Technology