Refer to the exhibit.
Which method was used to define this rogue AP as malicious?
A.
This rogue AP matched a WCS malicious rogue AP classification rule.
B.
A WCS switch port trace was performed and the MAC address of the rogue AP was found
connected to a Cisco switch port.
C.
This rogue AP was discovered using RLDP.
D.
A rogue AP alert was enabled that defines all rogues with open SSIDs as malicious.