Which of the following types of attacks involves interception of authentication traffic in an attempt
to gain unauthorized access to a wireless network?
A.
Near field communication
B.
IV attack
C.
Evil twin
D.
Replay attack
Which of the following types of attacks involves interception of authentication traffic in an attempt
to gain unauthorized access to a wireless network?
Which of the following types of attacks involves interception of authentication traffic in an attempt
to gain unauthorized access to a wireless network?
A.
Near field communication
B.
IV attack
C.
Evil twin
D.
Replay attack
I think it should be Replay Attack not IV Attack IV attack is for decrypt traffic rather than gaining access to unauthorized data.
An IV Attack is a type of wireless attack. (this one is on a wireless network)
A replay attack can be any network, but data is stored for use at a later time.