Dictionary attacks are used to attack what aspect of WEP2?

A. encryption
B. initialization vector problems
C. pseudo-random number generator issues
D. authentication


Answer: D

Computer Science & Information Technology

You might also like to view...

Write a function to do an insertion sort on a list.

What will be an ideal response?

Computer Science & Information Technology

When working in Office programs, you can open more than one file at a time.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

By default, subforms display their controls the same way in both Design View and Form View.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

________ allows for very recent file changes to be restored.

A. Image Backup B. File Backup C. Shadowing D. File/Folder Backup

Computer Science & Information Technology