Refer to the exhibit.
Which method was used to define this rogue AP as malicious?
A. This rogue AP matched a WCS malicious rogue AP classification rule.
B. A WCS switch port trace was performed and the MAC address of the rogue AP was found connected to a Cisco switch port.
C. This rogue AP was discovered using RLDP.
D. A rogue AP alert was enabled that defines all rogues with open SSIDs as malicious.