A __________ attack occurs when an attacker continually bombards a wireless access point or some other accessible wireless port with various protocol messages designed to consume system resources.
Fill in the blank(s) with the appropriate word(s).
denial of service (DoS)
Computer Science & Information Technology
You might also like to view...
The Page Break view shows where the page breaks will occur by displaying ________
A) blue dashed lines and the page number on the worksheet B) an arrow to move the pages around in the worksheet C) a welcome screen D) the header and footer
Computer Science & Information Technology
Oracle, Microsoft Access, and MySQL are all examples of a(n) ____.
A. DBMS B. SQL statement C. 3NF D. word processor
Computer Science & Information Technology