What security vulnerability may result from a lack of staging, change management, and installation procedures for WLAN infrastructure equipment?
A . The WLAN system may be open to RF Denial-of-Service attacks.
B . Authentication cracking of 64-bit Hex WPA-Personal PS
D . AES-CCMP encryption keys may be decrypted.
E . WIPS may not classify authorized, rogue, and neighbor APs accurately.
Answer: D