What software and hardware tools are used together to hijack a wireless station from the authorized wireless network onto an unauthorized wireless network?
(Choose 2)
A.
RF jamming device and a wireless radio card
B.
A low-gain patch antenna and terminal emulation software
C.
A wireless workgroup bridge and a protocol analyzer
D.
DHCP server software and access point software
E.
MAC spoofing software and MAC DoS software