Which of the following is replayed during wireless authentication to exploit a weal key infrastructure?

Which of the following is replayed during wireless authentication to exploit a weal key
infrastructure?

Which of the following is replayed during wireless authentication to exploit a weal key
infrastructure?

A.
Preshared keys

B.
Ticket exchange

C.
Initialization vectors

D.
Certificate exchange



Leave a Reply to Juan Cancel reply1

Your email address will not be published. Required fields are marked *

nineteen − 14 =


Juan

Juan

I believe “initialization vectors” is the answer. There is no such thing as ticket when talking about wireless.