After disabling SSID broadcast, a network administrator still sees the wireless network listed in available
networks on a client laptop. Which of the following attacks may be occurring?
A.
Evil Twin
B.
ARP spoofing
C.
Disassociation flooding
D.
Rogue access point
E.
TKIP compromise