Which feature should you implement to detect a hacker invoking denial-of-service attacks, flooding
the network with associations and probes, inserting rogue access points, and affecting network
performance by attacking the quality of service?
A.
custom signature monitoring
B.
Management Frame Protection
C.
Cisco Message Integrity Check
D.
NTP synchronization