34. Which of the following can happen if an attacker sets the power levels on a rogue access point to overpower the wireless transmissions of a legitimate access point?
(A)Jamming
(B) Beaconing
(C) Deauthentication
(D) Spoofing
答案:登入後查看
統計: A(1), B(0), C(0), D(0), E(0) #3557276
統計: A(1), B(0), C(0), D(0), E(0) #3557276