________ is a technique for preventing two wireless stations from transmitting at the
same time and therefore interfering with each other.
A) Creating extended service sets
B) Roaming
C) The distribution system
D) Media access control
The password "NeVEr" can be defeated by a ________.
A) dictionary attack
B) hybrid dictionary attack
C) brute-force attack
D) none of the above
A user picks the password "tiger." This is likely to be cracked quickly by a(n)
________.
A) attack on an application running as root
B) brute-force attack