Which of the following is replayed during wireless authentication to exploit a weak key infrastructu seenagape 9 years ago Which of the following is replayed during wireless authentication to exploit a weak keyinfrastructure? A. Preshared keys B. Ticket exchange C. Initialization vectors D. Certificate exchange ← Previous question Next question →