An attacker captures valid wireless traffic in hopes of transmitting it repeatedly to generate enough traffic to discover the encryption key. Which of the following is the attacker MOST likely using?

An attacker captures valid wireless traffic in hopes of transmitting it repeatedly to generate enough traffic to discover the encryption key. Which of the following is the attacker MOST likely using?








A. War driving
B. Replay attack
C. Bluejacking
D. DNS poisoning









Answer: B


Computer Science

Learn More Multiple Choice Question :