You manage a wireless network that services 200 wireless users. Your facility requires 20 access points, and you have installed an IEEE 802.11-compliant implementation of 802.1X/LEAP with AES-CCMP as an authentication and encryption solution.
In this configuration, the wireless network is initially susceptible to what type of attack?
A . Offline dictionary attacks
B . Application eavesdropping
C . Session hijacking
D . Layer 3 peer-to-peer
E . Encryption cracking
Answer: A