In order to acquire credentials of a valid user on a public hot-spot network, what attacks may be conducted? Choose the single completely correct answer.

A.
Social engineering and/or eavesdropping
B.
RF DoS and/or physical theft
C.
MAC denial of service and/or physical theft
D.
Authentication cracking and/or RF DoS
E.
Code injection and/or XSS