A __________ attack occurs when an attacker continually bombards a wireless access point or some other accessible wireless port with various protocol messages designed to consume system resources.

Fill in the blank(s) with the appropriate word(s).

denial of service (DoS)

Computer Science & Information Technology

You might also like to view...

The Page Break view shows where the page breaks will occur by displaying ________

A) blue dashed lines and the page number on the worksheet B) an arrow to move the pages around in the worksheet C) a welcome screen D) the header and footer

Computer Science & Information Technology

Oracle, Microsoft Access, and MySQL are all examples of a(n) ____.

A. DBMS B. SQL statement C. 3NF D. word processor

Computer Science & Information Technology