Which of the following describes how Sara, an attacker, can send unwanted advertisements to a mobile device?
Which of the following types of attacks involves interception of authentication traffic in an attempt to gain unauthorized access to a wireless network?