CompTIA Exam Questions

Which of the following attacks is this an example of?

A security administrator is using a software program to test the security of a wireless access point.
After running the program for a few hours, the access point sends the wireless secret key back to
the software program. Which of the following attacks is this an example of?

A.
WPS

B.
IV

C.
Deauth

D.
Replay