We've detected that Javascript is not enabled. It is required for an optimal survey taking experience. Please check your browser's settings and make sure Javascript is turned on. Learn how to enable Javascript.
4. What is the preferred communications method used with systems on a bot-net?Hint: What would be a good way to instantaneously contact a whole bunch of clients at once?
5. Which of the following best describes a distributed denial-of-service attack?Hint: This term is closely associated with bot-nets.
9. What is TKIP and how does it make WPA-2 a better security choice for your wireless network?Hint: The name should give it away.