Which method was used to define this rogue AP as malicious?

Refer to the exhibit.

Which method was used to define this rogue AP as malicious?

Refer to the exhibit.

Which method was used to define this rogue AP as malicious?

A.
This rogue AP matched a WCS malicious rogue AP classification rule.

B.
A WCS switch port trace was performed and the MAC address of the rogue AP was found
connected to a Cisco switch port.

C.
This rogue AP was discovered using RLDP.

D.
A rogue AP alert was enabled that defines all rogues with open SSIDs as malicious.



Leave a Reply 0

Your email address will not be published. Required fields are marked *