Watch this video on YouTube
Which of the following attacks exploits a vulnerability in the WPA2 protocol's four-way handshake to compromise Wi-Fi security?