ECCouncil 312-50 Question Answer
During a wireless penetration test, a tester detects an access point using WPA2 encryption. Which of the following attacks should be used to obtain the key?
ECCouncil 312-50 Summary
- Vendor: ECCouncil
- Product: 312-50
- Update on: Jul 25, 2025
- Questions: 614