What is the commonly known name for the process of generating and gathering initialization vectors, either passively or actively, for the purpose ofdetermining the security key of a wireless network?
A. WEP cracking
B. session hijacking
C. man-in-the-middle attacks
D. disassociation flood frames