Which of the following types of attacks involves interception of authentication traffic in an
attempt to gain unauthorized access to a wireless network?
A.
Near field communication
B.
IV attack
C.
Evil twin
D.
Replay attack
Which of the following types of attacks involves interception of authentication traffic in an
attempt to gain unauthorized access to a wireless network?
Which of the following types of attacks involves interception of authentication traffic in an
attempt to gain unauthorized access to a wireless network?
A.
Near field communication
B.
IV attack
C.
Evil twin
D.
Replay attack