Which of the following types of attacks involves interception of authentication traffic in an attempt to gain unauthorized access to a wireless network?
A. Near field communication
B. IV attack
C. Evil twin
D. Replay attack
2 Comments on “Which of the following types of attacks involves interception of authentication traffic in an attempt to gain ”
tomsays:
I thought the answer should be D) Replay attack.
0
0
Chrissays:
So did I at first, but then I saw “wireless network.” I think this is just another poorly worded question.
I thought the answer should be D) Replay attack.
0
0
So did I at first, but then I saw “wireless network.” I think this is just another poorly worded question.
0
0