CompTIA Exam Questions

Which of the following can be used to compromise a WPA encrypted wireless network when the rainbow t

Which of the following can be used to compromise a WPA encrypted wireless network when the rainbow table
does not contain the key?

A.
Evil twin

B.
War chalking

C.
Buffer overflow

D.
Virus