Which of the following attack vectors would the attacker MOST likely use?
An attacker is attempting to gain unauthorized access to a WiR network that uses WPA2-PSK.
Which of the following attack vectors would the attacker MOST likely use?
A . Capture a three-way handshake and crack it
B . Capture a mobile device and crack its encryption
C . Create a rogue wireless access point
D . Capture a four-way handshake and crack it
Answer: D
Latest PT0-001 Dumps Valid Version with 248 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Subscribe
Login
0 Comments
Inline Feedbacks
View all comments