A network administrator is performing a penetration test on the WPA2 wireless network. Which of
the following can be used to find the key?
A.
DoS
B.
Buffer overflow
C.
Dictionary file
D.
SQL injection
A network administrator is performing a penetration test on the WPA2 wireless network. Which of
the following can be used to find the key?
A network administrator is performing a penetration test on the WPA2 wireless network. Which of
the following can be used to find the key?
A.
DoS
B.
Buffer overflow
C.
Dictionary file
D.
SQL injection