A network administrator is performing a penetrationtest on the WPA2 wireless network. Which of the following
can be used to find the key?
A.
DoS
B.
Buffer overflow
C.
Dictionary file
D.
SQL injection
A network administrator is performing a penetrationtest on the WPA2 wireless network. Which of the following
can be used to find the key?
A network administrator is performing a penetrationtest on the WPA2 wireless network. Which of the following
can be used to find the key?
A.
DoS
B.
Buffer overflow
C.
Dictionary file
D.
SQL injection