Multiple Choice
____ operates by passively monitoring transmissions and computing the encryption key when enough packets have been gathered.
A) KisMAC
B) NetStumbler
C) Aircrack-ng
D) AirSnort
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q1: _ hold a list of MAC addresses
Q2: The primary purpose of _ is to
Q3: _ is a tool that allows a
Q4: _ are devices used to access a
Q6: _ are devices used to block wireless
Q7: _ occurs when an attacker intercepts packets
Q8: The term _ is used to describe
Q9: _ is a wireless hacking tool for
Q10: _ is a free stumbler application for