Which of the following types of attacks involves interception of authentication traffic in an attempt to gain unauthorized access to a wireless network?

Which of the following types of attacks involves interception of authentication traffic in an attempt
to gain unauthorized access to a wireless network?

Which of the following types of attacks involves interception of authentication traffic in an attempt
to gain unauthorized access to a wireless network?

A.
Near field communication

B.
IV attack

C.
Evil twin

D.
Replay attack



Leave a Reply 2

Your email address will not be published. Required fields are marked *


nedal

nedal

I think it should be Replay Attack not IV Attack IV attack is for decrypt traffic rather than gaining access to unauthorized data.

Cobra

Cobra

An IV Attack is a type of wireless attack. (this one is on a wireless network)

A replay attack can be any network, but data is stored for use at a later time.