Which of the following attack vectors would the attacker MOST likely use?

An attacker is attempting to gain unauthorized access to a WiR network that uses WPA2-PSK.

Which of the following attack vectors would the attacker MOST likely use?
A . Capture a three-way handshake and crack it
B . Capture a mobile device and crack its encryption
C . Create a rogue wireless access point
D . Capture a four-way handshake and crack it

Answer: D

Latest PT0-001 Dumps Valid Version with 248 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments