Which of the following have non-overlapping RF spectrums in 802.11b/g/n?
a. channel 1
b. channel 3
c. channel 6
d. channel 9
e. channel 11
a. channel 1
c. channel 6
e. channel 11
Computer Science & Information Technology
You might also like to view...
Which of the following can be used to defend against SYN flood attacks?
a. Micro blocks b. SYN cookies c. Stateful packet inspection firewalls d. All the above
Computer Science & Information Technology
Which of the following attacks installs a key logger on the victim's system in an attempt to collect usernames and passwords?
A. IP spoofing attack B. Denial-of-service attack C. Rogue code attack D. Emanation eavesdropping attack
Computer Science & Information Technology