Question

In addition to deauthenticate messages, an attacker could flood wireless clients with ________.
A) RTS
B) CTS
C) Both A and B
D) Neither A nor B

Answer

This answer is hidden. It contains 1 characters.