Which of the following have non-overlapping RF spectrums in 802.11b/g/n?

a. channel 1
b. channel 3
c. channel 6
d. channel 9
e. channel 11

a. channel 1
c. channel 6
e. channel 11

Computer Science & Information Technology

You might also like to view...

Which of the following can be used to defend against SYN flood attacks?

a. Micro blocks b. SYN cookies c. Stateful packet inspection firewalls d. All the above

Computer Science & Information Technology

Which of the following attacks installs a key logger on the victim's system in an attempt to collect usernames and passwords?

A. IP spoofing attack B. Denial-of-service attack C. Rogue code attack D. Emanation eavesdropping attack

Computer Science & Information Technology