All of the following are discovered in wireless traffic analysis except? Determine appropriate strategy for an attack Identify initialization vector reuse Identify vulnerabilities Determine the broadcast SSID