Once an attacker's wireless device has entered the network and focused its attacks at other similar devices this is known as a(n) ____________________.
Fill in the blank(s) with the appropriate word(s).
peer-to-peer attack
Computer Science & Information Technology
You might also like to view...
Headers and footers will save you the work of having to type the same information on every page, but cannot be altered once saved
Indicate whether the statement is true or false
Computer Science & Information Technology
In earlier versions of Windows, the background was referred to as:
A) backdrop. B) setting. C) wallpaper. D) windows.
Computer Science & Information Technology