CompTIA Security Plus Mock Test Q1505

A security administrator is using a software program to test the security of a wireless access point. After running the program for a few hours, the access point sends the wireless secret key back to the software program. Which of the following attacks is this an example of?

A. WPS
B. IV
C. Deauth
D. Replay

Correct Answer: C
Section: Mixed Questions