Why would you need to find out the gateway of a device when investigating a wireless attack?
A.
The gateway will be the IP of the proxy server used by the attacker to launch the attack
B.
The gateway will be the IP of the attacker computer
C.
The gateway will be the IP used to manage the RADIUS server
D.
The gateway will be the IP used to manage the access point