Which option best describes the limitation of a client that is attempting to manage a WLC while using the client wireless adapter connection to the wireless infrastructure?
A.
Controllers must be managed using only secure protocols (that is, SSH and HTTPS), not nonsecure protocols (that is, HTTP and Telnet).
B.
Read-write access is not available; only read-only access is supported.
C.
Uploads and downloads from the controller are not allowed.
D.
Wireless clients can manage other controllers, but not the same controller and the AP to which the client is associated.
Explanation: