Home » CompTIA » JK0-019 » Which of the following can be used to compromise a WPA encrypted wireless network when the rainbow table does not contain the key?
Which of the following can be used to compromise a WPA encrypted wireless network when the rainbow table does not contain the key?
A. Evil twin
B. War chalking
C. Buffer overflow
D. Virus
Correct Answer: A
Explanation/Reference:
Explanation: An evil twin is the wireless version of the phishing scam. An attacker fools wireless users into connecting a laptop or mobile phone to a tainted hotspot by posing as a legitimate provider.This type of evil twin attack may be used to steal the passwords of unsuspecting users by either snooping the communication link or by phishing, which involves setting up a fraudulent web site and luring people there.