Which of the following attacks is this an example of?

A security administrator is using a software program to test the security of a wireless access point. After
running the program for a few hours, the access point sends the wireless secret key back to the software
program. Which of the following attacks is this an example of?

A security administrator is using a software program to test the security of a wireless access point. After
running the program for a few hours, the access point sends the wireless secret key back to the software
program. Which of the following attacks is this an example of?

A.
WPS

B.
IV

C.
Deauth

D.
Replay



Leave a Reply 1

Your email address will not be published. Required fields are marked *

eight + 19 =


Black

Black

isn’t that A?