A corporate wireless guest network uses an open SSID with a captive portal to authenticate guest users.
Guests can obtain their portal password at the service desk. A security consultant alerts the administrator
that the captive portal is easily bypassed, as long as one other wireless guest user is on the network.
Which of the following attacks did the security consultant use?

A.
ARP poisoning
B.
DNS cache poisoning
C.
MAC spoofing
D.
Rouge DHCP server