A network administrator is performing a penetration test on the WPA2 wireless network. Which of the following can be used to find the key?

A. DoS
B. Buffer overflow
C. Dictionary file
D. SQL injection

Answer: C. Dictionary file

Computer Science & Information Technology

You might also like to view...

The Recovery Console is used on a Windows Vista computer that has a startup problem that cannot be solved with startup options such as Safe Mode

Indicate whether the statement is true or false

Computer Science & Information Technology

A technician is extending a data circuit to the other side of the building. Which of the following would the technician set up at the new location?

A. EMI B. MDF C. IDF D. ESD

Computer Science & Information Technology