Which of the following is replayed during wireless authentication to exploit a weak key infrastructure?
A. Preshared keys
B. Ticket exchange
C. Initialization vectors
D. Certificate exchange
Answer: B. Ticket exchange
You might also like to view...
Describe the three permissions that can be assigned to a directory or file in UNIX/Linux systems.
What will be an ideal response?
An Office feature that provides a preview of the results of a selection when you point to it.
What will be an ideal response?
A company that trains their users to lock the doors behind them is MOST likely trying to prevent:
A. Vishing attacks B. Dumpster diving C. Shoulder surfing D. Tailgating
Which of the following BEST describes how a layer 2 switch functions?
A. Switches packets within the same subnet based on MAC addresses B. Switches packets between different subnets based on IP addresses C. Switches packets between different subnets based on MAC addresses D. Switches packets within the same subnet based on IP addresses