Which countermeasure is best used to protect against rogue access points that are outside the enterprise physical perimeter and that attempt to attract legitimate clients?
A.
dedicated rogue detector access points with active and passive RLDP and radio containment
B.
personal firewall
C.
Management Frame Protection
D.
wireless IDS/IPS
E.
EAP-TLS bidirectional authentication