PrepAway - Latest Free Exam Questions & Answers

Which of the following attacks is taking place?

A malicious user is sniffing a busy encrypted wireless network waiting for an authorized client to

connect to it. Only after an authorized client has connected and the hacker was able to capture the
client handshake with the AP can the hacker begin a brute force attack to discover the encryption
key. Which of the following attacks is taking place?

PrepAway - Latest Free Exam Questions & Answers

A.
IV attack

B.
WEP cracking

C.
WPA cracking

D.
Rogue AP

Explanation:
There are three steps to penetrating a WPA-protected network.
Sniffing
Parsing
Attacking


Leave a Reply