Select one option from A & B below and complete the discussion question. Discuss/describe the attacks associated with WEP, WPA, WPA2 or Bluetooth not covered in Module 9.

technical writing