Which of the following is replayed during wireless authentication to exploit a weal key infrastructure?
A.
Preshared keys
B.
Ticket exchange
C.
Initialization vectors
D.
Certificate exchange
Which of the following is replayed during wireless authentication to exploit a weal key infrastructure?
Which of the following is replayed during wireless authentication to exploit a weal key infrastructure?
A.
Preshared keys
B.
Ticket exchange
C.
Initialization vectors
D.
Certificate exchange