This is when an attacker sends a special type of message to the wireless access point with the victim’s MAC address which disconnects the victim’s connection from the AP.

What will be an ideal response?

deauthentication

Computer Science & Information Technology

You might also like to view...

The ________ offers details about changes to a document and removes comment balloons and displays the comments as text only

A) Detailed Summary View B) Reviewing Pane C) Summary Pane D) Track Changes Pane

Computer Science & Information Technology

You can use the mouse to move an image, you cannot use the directional arrow keys

Indicate whether the statement is true or false

Computer Science & Information Technology