AMA University Answers
Login
Register
AMA OED
Courses
IT
IT-6310
It uses available resources, s...
It uses available resources, such as passwords or scripts.
unstructured attacks
Correct
Similar IT-6310 questions
It helps prevent attackers from monitoring or recording traffic between resources and computers.
It is a self-replicating program that is harmful to networks.
It disguises as useful software.
It is a wireless security protocol created by Cisco to address the weaknesses in WEP and WPA.
It could be exploited because of an encryption key that was vulnerable to decoding.
It was the first generation security standard for wireless network.