An object-oriented approach to software development is a methodology.
Indicate whether the statement is true or false
Question 2
A __________ attack targets wireless access points that are exposed to non-filtered network traffic, such as routing protocol messages or network management messages.
What will be an ideal response?