In order to acquire credentials of a valid user on a public hotspot network, what attacks may be conducted? Choose the single completely correct answer.
A . MAC denial of service and/or physical theft
B . Social engineering and/or eavesdropping
C . Authentication cracking and/or RF DoS
D . Code injection and/or XSS
E . RF DoS and/or physical theft
Answer: B