Question: QUESTION 14 A_attack on WEP involves viewing collisions to derive plaintext values O capture O keystream o weak key O pseudo-random number QUESTION 15 When

QUESTION 14 A_attack on WEP involves viewing collisions to derive plaintext values O capture O keystream o weak key O pseudo-random number QUESTION 15 When a wireless connection is made using preshared keys, what does the preshared key (passphrase) become in the secure connection? PMK O GTK PTK O Nothing, it is discarded QUESTION 16 What feature of a WIPS solution can be used to physically locate a nonapproved wireless device? O RF signature analysis O RF calibration O Rogue triangulation O Rogue containment
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
