Which of the following can be used to find the key? seenagape 12 years ago A network administrator is performing a penetrationtest on the WPA2 wireless network. Which of the followingcan be used to find the key? A.DoS B.Buffer overflow C.Dictionary file D.SQL injection ← Previous question Next question →