On a WLAN with spoofing attack detection enabled, based on which of the following items does an AP detect spoofing attacks?
A . Sizes of Disassociation and Deauthentication frames
B . Number of Disassociation and Deauthentication frames
C . Source addresses of Disassociation and Deauthentication frames
D . Destination addresses of Disassociation and Deauthentication frames
Answer: C