CompTIA Exam Questions

Which of the following can be used to find the key?

A network administrator is performing a penetrationtest on the WPA2 wireless network. Which of the following
can be used to find the key?

A.
DoS

B.
Buffer overflow

C.
Dictionary file

D.
SQL injection