A network administrator is implementing a wireless honeypot to detect wireless breach attempts.
The honeypot must implement weak encryption to lure malicious users into easily breaking into the
network. Which of the following should the network administrator implement on the WAP?
A.
WPA
B.
WPA2
C.
WEP
D.
VPN