Which of the following can be used to compromise a WPA encrypted wireless network when the rainbow table
does not contain the key?
A.
Evil twin
B.
War chalking
C.
Buffer overflow
D.
Virus
Which of the following can be used to compromise a WPA encrypted wireless network when the rainbow table
does not contain the key?
Which of the following can be used to compromise a WPA encrypted wireless network when the rainbow table
does not contain the key?
A.
Evil twin
B.
War chalking
C.
Buffer overflow
D.
Virus