Can two users on an 802.11n network with WPA/WPA2 intercept each other's traffic?
No they can't. WPA/WPA2 provides different per session key for data encryption. PSK start with the same passphrase, however each station is given different key for unicast traffic. The only traffic you will see(or decrypt) through sniffer is broadcast packet. So the situation is same as you sniffer traffic when you are connected to wire switch.
q2) No. alice is not able to intercept.
The short answer is, no, with only the pre-shared key (PSK) you cannot decrypt other user's traffic, but, it is fairly simple to collect the additional information needed to decrypt the traffic. Stations don't directly use the PSK to encrypt packets. Instead, they use the PSK to generate a Pairwise Master Key (PMK) which in turn generates the Pairwise Transient Key (PTK) used for encrypting packets. Both parties, the station and access point (AP), calculate the PTK using nonces (random numbers), the MAC addresses, and a couple other pieces of data combined with the PMK. All the data other than the PSK is in the 4-way handshake and is not encrypted.
So knowing the PSK and collecting the 4 frames of the RSN protocol (a.k.a the 4-way handshake) is enough information to feed into something like Wireshark and decrypt traffic between a station and AP. You can argue that collecting the data from the 4-way handshake is timing sensitive, but several (free) tools exist that allow a third party to forge de-authentication packets enabling an attacker to better predict when to capture this information.