What are two security risks on 802.11 WLANs that implement WEP using a static 40-bit key with open authentication? (Choose two.)
A.
The IV is transmitted as plaintext, and an attacker can sniff the WLAN to see the IV.
B.
The challenge packet sent by the wireless AP is sent unencrypted.
C.
The response packet sent by the wireless client is sent unencrypted.
D.
WEP uses a weak-block cipher such as the Data Encryption Algorithm.
E.
One-way authentication only where the wireless client does not authenticate the wireless-access point.