which method is a rogue contained?

In an infrastructure based on a wireless advanced feature set using lightweight access points, by which method is a rogue contained?

In an infrastructure based on a wireless advanced feature set using lightweight access points, by which method is a rogue contained?

A.
The WCS sends excessive traffic to the rogue thus overloading the access point.

B.
The rogue MAC address is used to spoof broadcastdeassociation packets.

C.
The rogue MAC address is used to spoof broadcastdeauthentication packets.

D.
The WCS sends out excessive signals on the same channel when the rogue is detected.



Leave a Reply 0

Your email address will not be published. Required fields are marked *