In which type of wireless attack does the attacker cause valid users to lose their connections by sending a forged deauthentication frame to their stations?

A. association flood
B. jamming
C. session hijacking
D. MAC address spoofing

Answer: C

Computer Science & Information Technology

You might also like to view...

When business logic requires the comparison of two or more fields, you need to use what type of macro?

A) Data B) Logic C) Stand-alone D) Embedded

Computer Science & Information Technology

What is displayed on the console when running the following program?

``` public class Test { public static void main(String[] args) { try { p(); System.out.println("After the method call"); } catch (RuntimeException ex) { System.out.println("RuntimeException"); } catch (Exception ex) { System.out.println("Exception"); } } static void p() throws Exception { try { String s = "5.6"; Integer.parseInt(s); // Cause a NumberFormatException int i = 0; int y = 2 / i; System.out.println("Welcome to Java"); } catch (RuntimeException ex) { System.out.println("RuntimeException"); } catch (Exception ex) { System.out.println("Exception"); } } }``` a. The program displays RuntimeException twice. b. The program displays Exception twice. c. The program displays RuntimeException followed by After the method call. d. The program displays Exception followed by RuntimeException. e. The program has a compile error.

Computer Science & Information Technology