A network administrator is performing a penetration test on the WPA2 wireless network. Which of the following can be used to find the key?
A. DoS
B. Buffer overflow
C. Dictionary file
D. SQL injection
Answer: C. Dictionary file
Computer Science & Information Technology
You might also like to view...
The Recovery Console is used on a Windows Vista computer that has a startup problem that cannot be solved with startup options such as Safe Mode
Indicate whether the statement is true or false
Computer Science & Information Technology
A technician is extending a data circuit to the other side of the building. Which of the following would the technician set up at the new location?
A. EMI B. MDF C. IDF D. ESD
Computer Science & Information Technology