A corporate wireless guest network uses an open SSID with a captive portal to authenticate guest
users. Guests can obtain their portal password at the service desk. A security consultant alerts the
administrator that the captive portal is easily bypassed, as long as one other wireless guest user is
on the network. Which of the following attacks did the security consultant use?

A.
ARP poisoning
B.
DNS cache poisoning
C.
MAC spoofing
D.
Rouge DHCP server