- What tools do black hat hackers use to attack wireless traffic? 200 words minimum.
- What are some possible attacks against WPA encrypted traffic? 200 words minimum.
- What is the evil twin attack? 200 words minimum.
- How can you authenticate, authorize, and audit wireless traffic on a Windows Active Directory Network? Please detail the actual setup. 500 words minimum.