List of questions
Related questions
Question 10 - PT0-003 discussion
During a security assessment, a penetration tester needs to exploit a vulnerability in a wireless network's authentication mechanism to gain unauthorized access to the network. Which of the following attacks would the tester most likely perform to gain access?
A.
KARMA attack
B.
Beacon flooding
C.
MAC address spoofing
D.
Eavesdropping
Your answer:
0 comments
Sorted by
Leave a comment first