To what common wireless network attacks is this network potentially vulnerable? (Choose 3)
What statement correctly pairs the type of WLAN attack with the exploited vulnerability? (Choose 3)
In addition to knowing the Pairwise Master Key (PMK) and the supplicants address (SA), what other three inputs must be collected with a protocol analyzer to recreate encryption keys? (Choose 3)