Given:
Many computer users connect to the Internet at airports, which often have 802.11n access points with a captive portal for authentication.
While using an airport hot-spot with this security solution, to what type of wireless attack is a user susceptible? (Choose 2)
A.
Man-in-the-Middle
B.
Wi-Fi phishing
C.
Management interface exploits
D.
UDP port redirection
E.
IGMP snooping