What is the correct process order that the client and access point go through to create a connection?
Which statement correctly matches the correct mitigation technique with the specified Layer 2 switch attack?