What is the commonly known name for the process of generating and gathering initialization
vectors, either passively or actively, for the purpose of determining the security key of a wireless
network?
A.
WEP cracking
B.
session hijacking
C.
man-in-the-middle attacks
D.
disassociation flood frames
Explanation: