PdfPrep.com

Which statement about the process of rogue containment performed on a rogue AP and rogue clients is true?

Which statement about the process of rogue containment performed on a rogue AP and rogue clients is true?
A . Trusted clients are configured to ignore the rogue AP so that only the rogue clients can connect.
B . An RF jammer is used to prevent the rogue AP from transmitting.
C . An authorized AP spoofs de-authentication packets that have the spoofed source address of the rogue A
E . A trusted AP is configured to mimic the rogue AP and to prevent clients from associating to the rogue A

Answer: C

Exit mobile version