Which of the following is a common threat that collects Initialization Vectors to help speed up the
algorithm for the attack?
A.
WEP cracking
B.
WPA cracking
C.
War driving
D.
Rogue access point
Which of the following is a common threat that collects Initialization Vectors to help speed up the
algorithm for the attack?
Which of the following is a common threat that collects Initialization Vectors to help speed up the
algorithm for the attack?
A.
WEP cracking
B.
WPA cracking
C.
War driving
D.
Rogue access point