-
What threats in addition to these may user face when using WLAN device?
-
for example fake networks and accesspoints
-
how does the WLAN network authenticate itself to user?