Which of the following can be used to compromise a WPA encrypted wireless network when the rainbow table does not contain the key?

Which of the following can be used to compromise a WPA encrypted wireless network when the rainbow table does not contain the key?
A. Evil twin
B. War chalking
C. Buffer overflow
D. Virus

comptia-exams

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.