Which of the following types of attacks involves interception of authentication traffic in an attempt to gain unauthorized access to a wireless network?
A. Near field communication
B. IV attack
C. Evil twin
D. Replay attack
2 Comments on “Which of the following types of attacks involves interception of authentication traffic in an attempt to gain ”
nedalsays:
I think it should be Replay Attack not IV Attack IV attack is for decrypt traffic rather than gaining access to unauthorized data.
0
0
Cobrasays:
An IV Attack is a type of wireless attack. (this one is on a wireless network)
A replay attack can be any network, but data is stored for use at a later time.
I think it should be Replay Attack not IV Attack IV attack is for decrypt traffic rather than gaining access to unauthorized data.
0
0
An IV Attack is a type of wireless attack. (this one is on a wireless network)
A replay attack can be any network, but data is stored for use at a later time.
0
0