Posted by: Pdfprep
Post Date: November 15, 2020
Which statement about the process of rogue containment performed on a rogue AP and rogue clients is true?
A . Trusted clients are configured to ignore the rogue AP so that only the rogue clients can connect.
B . An RF jammer is used to prevent the rogue AP from transmitting.
C . An authorized AP spoofs de-authentication packets that have the spoofed source address of the rogue A
E . A trusted AP is configured to mimic the rogue AP and to prevent clients from associating to the rogue A
Answer: C