A security administrator is testing the security of an AP. The AP is using WPA2. She ran an automated program for several hours and discovered the AP's passphrase. Which of the following methods was she MOST likely using?
A. IV attack
B. Disassociation attack
C. WPS attack
D. Evil twin attack

Respuesta :

Answer:

WPS attack

Explanation:

WiFi protected setup (WPS) is a convenient feature that allows the user to configure a client device against a wireless network by simultaneously pressing a button on both the access point and the client device (the client side “button” is often in software) at the same time. Since it has access to the Access point, it can get the passphrase.