Given the scenario, which of the following attacks would BEST assist the tester in obtaining this handshake?

A penetration tester is attempting to capture a handshake between a client and an access point by monitoring a WPA2-PSK secured wireless network. The tester is monitoring the correct channel for the identified network, but has been unsuccessful in capturing a handshake.

Given the scenario, which of the following attacks would BEST assist the tester in obtaining this handshake?
A . Karma attack
B . Deauthentication attack
C . Fragmentation attack
D . SSDI broadcast flood

Answer: B

Latest PT0-001 Dumps Valid Version with 248 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments