Which statement accurately describes this vulnerability?

A company CEO hears about Hole 196 and is concerned that WPA/WPA2 will not protect the company’s wireless communications from eavesdroppers.
Which statement accurately describes this vulnerability?
A. Hole 196 exploits a weakness in the WPA encryption algorithm but does not compromise WPA2.
B. Hole 196 allows an unauthorized user to spoof MAC addresses and detect the Group Transient Key (GTK).
C. Hole 196 exploits a weakness in both the WPA/WPA2 encryption algorithm, but a user can download a patch from their station or AP vendor.
D. Hole 196 allows malicious authorized users to implement attacks such as ARP poisoning.

Download Printable PDF. VALID exam to help you PASS.

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.