What four tools are required to hijack a wireless station (at Layer 2 and Layer 3) from the authorized wireless network onto the unauthorized wireless network? (Select two answers that together specify the four necessary tools)

A.
Access point software and a narrowband RF jamming device
B.
A high-gain Yagi antenna and terminal emulation software
C.
A wireless workgroup bridge and a spectrum analyzer
D.
A wireless PC card and DHCP server software
E.
MAC spoofing software and data flooding software