What software and hardware tools are used together to hijack a wireless station from the authorized wireless network in to an unauthorized wireless networks? (Choose 2)

A.
A low-gain patch antenna and terminal emulation software
B.
Narrow band RF jamming devices and wireless radio card
C.
DHCP server software and access point software
D.
A wireless work group bridge and protocol analyzer
E.
MAC spoofing software and MAC DOS software