A network administrator is implementing a wireless honeypot to detect wireless breach attempts. The honeypot
must implement weak encryption to lure malicious users into easily breaking into the network. Which ofthe
following should the network administrator implement on the WAP?
A.
WPA
B.
WPA2
C.
WEP
D.
VPN