Given: You manage a wireless network that services 200 wireless users.
Your facility requires 20 access points, and you have installed an IEEE 802.11-compliant implementation of 802.1X/LEAP (CCMP/AES) as an authentication and encryption solution.
In this configuration, the wireless network is susceptible to what type of attacks?

A.
Man-in-the-middle
B.
Password dictionary
C.
Layer 3 peer-to-peer
D.
Eavesdropping
E.
Session hijacking
F.
RF DoS