Which of the following could involve moving physical locations every two years to help mitigate security risks?
Which of the following consists of markings outside a building that indicate the connection speed of a nearby unsecured wireless network? 110
Which of the following type of attacks sends out numerous MAC resolution requests to create a buffer overflow attack?