There is a WEP encrypted wireless access point (AP) with no clients connected. In order to crack
the WEP key, a fake authentication needs to be performed. What information is needed when
performing fake authentication to an AP? (Choose two.)
A.
The IP address of the AP
B.
The MAC address of the AP
C.
The SSID of the wireless network
D.
A failed authentication packet