A Valid client laptop is attempting to associate to a Rogue AP. The AM in proximity creates a Tarpit. What are the two mechanisms that the AM can utilize to Tarpit? (Choose two)
A. Fake client’s BSSID
B. Fake SSID
C. Fake Channel
D. Fake BSSID
E. Fake ESS ID