You are a networking consultant who has been asked to penetration test the network of a small business. you located a target wireless network and can connect, but you cannot authenticate because it uses wpa2-psk encryption. how can you bypass the encryption