Which of the following is a common threat that collects Initialization Vectors to help speed up the algorithm for the attack?
A. WEP cracking
B. WPA cracking
C. War driving
D. Rogue access point
Which of the following is a common threat that collects Initialization Vectors to help speed up the algorithm for the attack?
A. WEP cracking
B. WPA cracking
C. War driving
D. Rogue access point