A network administrator is performing a penetration test on the WPA2 wireless network. Which of the following can be used to find the key?
A. DoS
B. Buffer overflow
C. Dictionary file
D. SQL injection
A network administrator is performing a penetration test on the WPA2 wireless network. Which of the following can be used to find the key?
A. DoS
B. Buffer overflow
C. Dictionary file
D. SQL injection