Which of the following vulnerabilities may occur while the client and the AP exchange the challenge text over the wireless link?

John works as a network administrator for Web Perfect Inc. The company has a wireless LAN
network. John has configured shared key authentication on a client. The client and the AP start
exchanging the frames to enable authentication. Which of the following vulnerabilities may occur
while the client and the AP exchange the challenge text over the wireless link?

John works as a network administrator for Web Perfect Inc. The company has a wireless LAN
network. John has configured shared key authentication on a client. The client and the AP start
exchanging the frames to enable authentication. Which of the following vulnerabilities may occur
while the client and the AP exchange the challenge text over the wireless link?

A.
Land attack

B.
Vulverability attack

C.
DoS attack

D.
Man-in-the-middle attack



Leave a Reply 0

Your email address will not be published. Required fields are marked *