A security administrator is using a software program to test the security of a wireless access point. After running
the program for a few hours, the access point sends the wireless secret key back to the software program.
Which of the following attacks is this an example of?
A.
WPS
B.
IV
C.
Deauth
D.
Replay