Priority addresses the problem of ________.
A) momentary traffic peaks
B) chronic under-capacity
C) both A and B
D) neither A nor B
The Trojan horse placed on the first compromised GHOSTNET client could ________.
A) conduct audio and video surveillance
B) delete files
C) both A and B
D) neither A nor B
In a single network transmission, there is always ________.
A) a single frame
B) a single data link
C) both A and B