Which of the following should be used to extend the range of a network between two points where physical media cannot be installed?
Which of the following attack techniques involves using a WAP with the same SSID to trick users into revealing usernames and passwords?
Which of the following naming conventions takes place in the data link layer of the OSI model and is often used in conjunction with IPv6?