Which of the following can be used to find the key?

A network administrator is performing a penetration test on the WPA2 wireless network. Which of
the following can be used to find the key?

A network administrator is performing a penetration test on the WPA2 wireless network. Which of
the following can be used to find the key?

A.
DoS

B.
Buffer overflow

C.
Dictionary file

D.
SQL injection

Explanation:
A file used by the debugger. It contains information about a program’s structure and contents. The

Compiler creates the dictionary file in the first phase of compilation, when checking the syntax. A
dictionary file has the filename extension .idy, and is often referred to an .idy file.



Leave a Reply 0

Your email address will not be published. Required fields are marked *