PrepAway - Latest Free Exam Questions & Answers

Which of the following can be used to compromise a WPA encrypted wireless network when the rainbow table does

Which of the following can be used to compromise a WPA encrypted wireless network when the
rainbow table does not contain the key?

PrepAway - Latest Free Exam Questions & Answers

A.
Evil twin

B.
War chalking

C.
Buffer overflow

D.
Virus

Explanation:
An evil twin is the wireless version of the phishing scam. An attacker fools wireless users into
connecting a laptop or mobile phone to a tainted hotspot by posing as a legitimate provider.This
type of evil twin attack may be used to steal the passwords of unsuspecting users by either
snooping the communication link or by phishing, which involves setting up a fraudulent web site
and luring people there.


Leave a Reply