What is the main difference between wpa and wpa2? what configuration information is required on an access point to authenticate users joining the wireless network against a network authentication server? widget corporation has provided wireless access for its employees using several aps located in different parts of the building. employees connect to the network using 802.11g-compatible network cards. on thursday afternoon, several users report that they cannot log on to the network. what troubleshooting step would you take first? why might an attacker launch a disassociation attack against an access point? your company has a lobby area where guest access is provided so that visitors can get internet access. the open guest wlan is currently connected to the production network. the only protection against visitors and hackers getting into the organization's data is file and directory rights. what steps should be taken to provide guest access and better protect the organization's data?