Which of the following can be used to compromise a WPA encrypted wireless network when the rainbow table does not contain the key?

Which of the following can be used to compromise a WPA encrypted wireless network when the
rainbow table does not contain the key?

Which of the following can be used to compromise a WPA encrypted wireless network when the
rainbow table does not contain the key?

A.
Evil twin

B.
War chalking

C.
Buffer overflow

D.
Virus

Explanation:
An evil twin is the wireless version of the phishing scam. An attacker fools wireless users into
connecting a laptop or mobile phone to a tainted hotspot by posing as a legitimate provider.This
type of evil twin attack may be used to steal the passwords of unsuspecting users by either
snooping the communication link or by phishing, which involves setting up a fraudulent web site
and luring people there.



Leave a Reply 0

Your email address will not be published. Required fields are marked *