

MCQOPTIONS
Saved Bookmarks
1. |
Tracking the position of cognitive radio without ____ |
A. | authorization violates user privacy |
B. | authorization is an adversarial attack |
C. | authentication violates user privacy |
D. | authentication is an adversarial attack |
Answer» B. authorization is an adversarial attack | |