During a wireless penetration test, a tester detects an access point using WPA2 encryption. Which of the following attacks should be used to obtain the key?
A) The tester must capture the WPA2 authentication handshake and then crack it.
B) The tester must use the tool inSSIDer to crack it using the ESSID of the network.
C) The tester cannot crack WPA2 because it is in full compliance with the IEEE 802.11i standard.
D) The tester must change the MAC address of the wireless network card and then use the AirTraf tool to obtain the key.
Correct Answer:
Verified
Q34: When creating a security program, which approach
Q35: What is the name of the international
Q36: A security consultant is trying to bid
Q37: A security consultant decides to use multiple
Q38: Which type of scan is used on
Q40: Which type of antenna is used in
Q41: A network administrator received an administrative alert
Q42: Firewalk has just completed the second phase
Q43: Which of the following is an example
Q44: A hacker is attempting to use nslookup
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents