Given: John Smith often telecommutes from a coffee shop near his home.
The coffee shop has an ERP access point with a captive portal for authentication.
At this hotspot, John’s Wi-Fi enabled computer is susceptible to what types of WLAN attacks?

A.
TCP port redirection
B.
Wi-Fi phishing
C.
Peer-to-peer
D.
802.11 RARP
E.
Eavesdropping
F.
Bluesnarf