which method is a rogue contained?

In an infrastructure based on a wireless advanced feature set using lightweight access points, by which method is a rogue contained?

In an infrastructure based on a wireless advanced feature set using lightweight access points, by which method is a rogue contained?

A.
The WCS sends excessive traffic to the rogue, thus overloading the access point.

B.
The rogue MAC address is used to spoof broadcast deassociation packets.

C.
The rogue MAC address is used to spoof broadcast deauthentication packets.

D.
The WCS sends out excessive signals on the same channel when the rogue is detected.



Leave a Reply 0

Your email address will not be published. Required fields are marked *