Exam Premium

CompTIA exam questions

☰
  • CompTIA A+ 220-1101
  • CompTIA A+ 220-1102
  • CompTIA Network+
  • CompTIA Security+
  • CompTIA CASP+

CompTIA Security+ Question B-26


Which of the following is replayed during wireless authentication to exploit a weak key infrastructure?

A. Preshared keys
B. Ticket exchange
C. Initialization vectors
D. Certificate exchange

Answer: B
Tagged with 
Certificate exchange Infrastructure Initialization vectors Preshared keys Ticket exchange
 

Post navigation

Previous Post« Previous CompTIA Security+ Question B-25
Next Post CompTIA Security+ Question B-27Next »
Affiliated Sites
  • PMP Exam Questions
  • Cisco CCNA Exam Questions
  • CompTIA A+ 220-1101
  • CompTIA A+ 220-1102
  • CompTIA Network+
  • CompTIA Security+
  • CompTIA CASP+
Copyright © 2023 Exam Premium
×Close