What is the commonly known name for the process of generating and gathering
initialization vectors, either passively or actively, for the purpose of determining the
security key of a wireless network?
A.
WEP cracking
B.
session hijacking
C.
man-in-the-middle attacks
D.
disassociation flood frames