Which of the following attacks does not directly recover a WEP key and requires at least one data packet from a target AP for initiation?

A. MAC spoofing attack
B. Evil twin attack
C. Fragmentation attack
D. De-authentication attack

Answer: C. Fragmentation attack

Computer Science & Information Technology

You might also like to view...

Many companies require ____ to ensure privacy by preventing bystanders from viewing display contents.

A. screen filters B. LoJack for Laptops C. personal identification numbers D. firewalls

Computer Science & Information Technology

Explain the difference between problem solving as a sequential process and an iterative process.

What will be an ideal response?

Computer Science & Information Technology