CompTIA Exam Questions

Which of the following is replayed during wireless authentication to exploit a weak key infrastructu

Which of the following is replayed during wireless authentication to exploit a weak key
infrastructure?

A.
Preshared keys

B.
Ticket exchange

C.
Initialization vectors

D.
Certificate exchange