A network administrator is performing a penetration test on the WPA2 wireless network. Which of
the following can be used to find the key?
A.
DoS
B.
Buffer overflow
C.
Dictionary file
D.
SQL injection
Explanation:
A file used by the debugger. It contains information about a program’s structure and contents. TheCompiler creates the dictionary file in the first phase of compilation, when checking the syntax. A
dictionary file has the filename extension .idy, and is often referred to an .idy file.