What security vulnerabilities may result from a lack of staging, change management, and installation procedures for WLAN infrastructure equipment? (Choose 2)
A.
The WLAN system may be open to RF Denial-of-Service attacks
B.
WIPS may not classify authorized, rogue, and neighbor APs accurately
C.
Authentication cracking of 64-bit Hex WPA-Personal PSK
D.
Management interface exploits due to the use of default usernames and passwords for AP management
E.
AES-CCMP encryption keys may be decrypted