PrepAway - Latest Free Exam Questions & Answers

Which of the following attacks is this an example of?

A security administrator is using a software program to test the security of a wireless access point. After running
the program for a few hours, the access point sends the wireless secret key back to the software program.
Which of the following attacks is this an example of?

PrepAway - Latest Free Exam Questions & Answers

A.
WPS

B.
IV

C.
Deauth

D.
Replay


Leave a Reply