Which of the following can be used to find the key?

A network administrator is performing a penetration test on the WPA2 wireless network. Which of
the following can be used to find the key?

A network administrator is performing a penetration test on the WPA2 wireless network. Which of
the following can be used to find the key?

A.
DoS

B.
Buffer overflow

C.
Dictionary file

D.
SQL injection



Leave a Reply 0

Your email address will not be published. Required fields are marked *