Which statement describes a security weakness of a WPA2 with a PSK?
A.
The compromised key can be used for another connection.
B.
The key can be eavesdropped from the wireless medium.
C.
The key can be recreated from a few eavesdropped frames.
D.
The key is not case-sensitive and is vulnerable to compromise by brute-force methods.
compromis
another