A security administrator is using a software program to test the security of a wireless access point. After running the program for a few hours, the access point
sends the wireless secret key back to the software program.
Which of the following attacks is this an example of?

A.
WPS
B.
IV
C.
Deauth
D.
Replay
Explanation:
Deauth attack sends disassocate packets to one or more clients which are currently associated with a particular access point. Disassociating clients
can be done for a number of reasons:
Recovering a hidden ESSID. This is an ESSID which is not being broadcast. Another term for this is “cloaked”.
Capturing WPA/WPA2 handshakes by forcing clients to reauthenticate Generate ARP requests (Windows clients sometimes flush their ARP cache when
disconnected)
its cant be Deauth , I think …I think its WPS cracking …which can sends you WPS pin and WPA/WPA2 pin….its shuld be A
0
0
@Vke, The aiotestking admin posted the latest version (July 24, 2017) of CompTIA Cloud+ CV0-001 (v.1) exam questions. The technology world is converting into the Cloud technology. Let’s try to resolve these questions and pass this exam.
http://www.aiotestking.com/comptia/category/exam-cv0-001-comptia-cloud-certification-update-july-24th-2017/
1
0
The initialization vector (IV) that WEP uses for encryption is 24-bit and IVs are reused with the same key. By examining the repeating result, it is easy for intruders to crack the WEP secret key, known as an IV attack.
I would say that the correct is “B”.
0
0
Why not Deauth. If you’ve ever used Kali Linux then it makes sense
1
0