Which statement about the process of rogue containment performed on a rogue AP and rogue clients is true?

Posted by: Pdfprep Category: 300-370 Tags: , ,

Which statement about the process of rogue containment performed on a rogue AP and rogue clients is true?
A . Trusted clients are configured to ignore the rogue AP so that only the rogue clients can connect.
B . An RF jammer is used to prevent the rogue AP from transmitting.
C . An authorized AP spoofs de-authentication packets that have the spoofed source address of the rogue A
E . A trusted AP is configured to mimic the rogue AP and to prevent clients from associating to the rogue A

Answer: C

Leave a Reply

Your email address will not be published.