Which of the following is replayed during wireless authentication to exploit a weal key infrastructure?
A. Preshared keys
B. Ticket exchange
C. Initialization vectors
D. Certificate exchange
CompTIA exam questions
Which of the following is replayed during wireless authentication to exploit a weal key infrastructure?
A. Preshared keys
B. Ticket exchange
C. Initialization vectors
D. Certificate exchange