When investigating a wireless attack, which of the following can be obtained from the DHCP server?
MAC address of the attacker
Operating system of the attacker
IP traffic between the attacker and victim
Effectiveness of the VLAN terminator
Submit