89.5k views
4 votes
Key reinstallation attacks exploit design weaknesses in which type of network security protocol?

A). Kerberos
B). WEP
C). TLS
D). WPA2

1 Answer

1 vote

Final answer:

Key reinstallation attacks exploit design weaknesses in the WPA2 network security protocol.

Step-by-step explanation:

Key reinstallation attacks exploit design weaknesses in the WPA2 network security protocol. WPA2, which stands for Wi-Fi Protected Access 2, is a widely used protocol for securing wireless networks. In a key reinstallation attack, an attacker tricks a client device into reinstalling an already in-use encryption key, which can lead to unauthorized access and information leakage.

User Nick Albrecht
by
7.5k points