PrepAway - Latest Free Exam Questions & Answers

Tag: Exam 312-50V8 (update October 4th, 2015)

Exam 312-50V8: ECCouncil Certified Ethical Hacker v8 (update October 4th, 2015)

What is this attack most appropriately called?

Matthew re-injects a captured wireless packet back onto the network. He does this hundreds of
times within a second. The packet is correctly encrypted and Matthew assumes it is an ARP
request packet. The wireless host responds with a stream of responses, all individually encrypted
with different IVs. What is this attack most appropriately called?


Page 78 of 88« First...102030...7677787980...Last »