Given the scenario, which of the following attacks would BEST assist the tester in obtaining this handshake?
A penetration tester is attempting to capture a handshake between a client and an access point by monitoring a WPA2-PSK secured wireless network. The tester is monitoring the correct channel for the identified network, but has been unsuccessful in capturing a handshake.
Given the scenario, which of the following attacks would BEST assist the tester in obtaining this handshake?
A . Karma attack
B . Deauthentication attack
C . Fragmentation attack
D . SSDI broadcast flood
Answer: B
Latest PT0-001 Dumps Valid Version with 248 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Subscribe
Login
0 Comments
Inline Feedbacks
View all comments