PrepAway - Latest Free Exam Questions & Answers

Which of the following attacks is this an example of?

A security administrator is using a software program to test the security of a wireless access point.
After running the program for a few hours, the access point sends the wireless secret key back to
the software program. Which of the following attacks is this an example of?

PrepAway - Latest Free Exam Questions & Answers

A.
WPS

B.
IV

C.
Deauth

D.
Replay


Leave a Reply