Which of the following attacks does not directly recover a WEP key and requires at least one data packet from a target AP for initiation?

A. MAC spoofing attack
B. Evil twin attack
C. Fragmentation attack
D. De-authentication attack


Answer: C. Fragmentation attack

Computer Science & Information Technology

You might also like to view...

In Windows 8, what does swipe do?

A) Performs a primary action B) Pans across the screen C) Rotates something D) Selects something

Computer Science & Information Technology

A _____ follows Internet design protocols and enables a company to integrate new applications into its ecommerce strategy.?

A. ?web-centric architecture B. ?thin client C. ?data processing center D. ?corporate portal

Computer Science & Information Technology

A Function procedure can pass many values back to the calling procedure.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

System software is used for tasks such as word processing, calculations and playing games.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology