Which of the following attacks does not directly recover a WEP key and requires at least one data packet from a target AP for initiation?
A. MAC spoofing attack
B. Evil twin attack
C. Fragmentation attack
D. De-authentication attack
Answer: C. Fragmentation attack
Computer Science & Information Technology
You might also like to view...
Many companies require ____ to ensure privacy by preventing bystanders from viewing display contents.
A. screen filters B. LoJack for Laptops C. personal identification numbers D. firewalls
Computer Science & Information Technology
Explain the difference between problem solving as a sequential process and an iterative process.
What will be an ideal response?
Computer Science & Information Technology