Answer:
The blank is online learning
Answer:
I find 5 categories
Explanation:
1 Overview
2 Necessity
3 Types
4 Attended installation
4.1 Silent installation
4.2 Unattended installation
4.3 Headless installation
4.4 Scheduled or automated installation
4.5 Clean installation
4.6 Network installation
5 Installer
5.1 Bootstrapper
5.2 Common types
5.3 System installer
<span> In a network that uses WPA2-PSK encryption you can bypass the encryption by using the weakness in the WPA2-PSK system and that is the following:the encrypted password is shared in what is known as the 4-way handshake. </span> When a client authenticates to the access point, the client and
the AP go through a 4-step process of authentication.