MCQOPTIONS
Saved Bookmarks
| 1. |
Tracking the position of cognitive radio without ____ |
| A. | authorization violates user privacy |
| B. | authorization is an adversarial attack |
| C. | authentication violates user privacy |
| D. | authentication is an adversarial attack |
| Answer» B. authorization is an adversarial attack | |