Which property of the advanced feature set products prevents rogue access points from attaching
to the network?
A.
All management traffic is encrypted between the access point and the controller.
B.
The controller does not retain its configuration when it is removed from the network.
C.
The access point and the controller use X.509 certificates to verify identity.
D.
The access point does not retain its configuration when it is removed from the network.