Which four of these attacks or wireless tools can the standard IDS signatures on a wireless LAN controller detect? (Choose four)
A.
Association flood
B.
SYN flood
C.
NetStumbler
D.
Fragment Overlap attack
E.
Deautheorization flood
F.
Long HTTP request
G.
AirSnort
H.
Wellenreiter