Which two statements characterize wireless network security? (Choose two.)