Which of the following can be used to find the key?

A network administrator is performing a penetrationtest on the WPA2 wireless network. Which of the following
can be used to find the key?

A network administrator is performing a penetrationtest on the WPA2 wireless network. Which of the following
can be used to find the key?

A.
DoS

B.
Buffer overflow

C.
Dictionary file

D.
SQL injection



Leave a Reply 0

Your email address will not be published. Required fields are marked *

three + 1 =