Which of the following attacks involves the detection of wireless LANs either by sending probe requests over a connection or by listening to web beacons?
a. Ad hoc connection attack b. AP MAC spoofing c. Wardriving attack d. Rogue access point attack