A security administrator is using a software program to test the security of a wireless access point. After
running the program for a few hours, the access point sends the wireless secret key back to the software
program. Which of the following attacks is this an example of?

A.
WPS
B.
IV
C.
Deauth
D.
Replay
isn’t that A?
0
0