If a wireless network lacks proper encryption, attackers can inject malicious packets into the traffic stream.
Packet injection (Option A):
Attackers forge and transmit fake packets to manipulate network behavior.
Common in WEP/WPA attacks to force IV collisions or spoof DHCP responses.
[Reference: CompTIA PenTest+ PT0-003 Official Study Guide - "Wireless Injection and Exploitation Techniques", Incorrect options:, Option B (Bluejacking): Sends spam messages via Bluetooth, not for network exploitation., Option C (Beacon flooding): Overloads wireless access points, not an attack on encryption., Option D (Signal jamming): Disrupts connectivity but does not inject packets., , ]
Submit