ExamGecko
Question list
Search
Search

Related questions











Question 488 - 312-50v12 discussion

Report
Export

An attacker identified that a user and an access point are both compatible with WPA2 and WPA3 encryption. The attacker installed a rogue access point with only WPA2 compatibility in the vicinity and forced the victim to go through the

WPA2 four-way handshake to get connected. After the connection was established, the attacker used automated tools to crack WPA2-encrypted messages.

What is the attack performed in the above scenario?

A.
Timing-based attack
Answers
A.
Timing-based attack
B.
Side-channel attack
Answers
B.
Side-channel attack
C.
Downgrade security attack
Answers
C.
Downgrade security attack
D.
Cache-based attack
Answers
D.
Cache-based attack
Suggested answer: C
asked 18/09/2024
Naing Thet
41 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first