Which statement about the process of rogue containment performed on a rogue AP and rogue clients is true?

Which statement about the process of rogue containment performed on a rogue AP and rogue clients is true?
A. Trusted clients are configured to ignore the rogue AP so that only the rogue clients can connect.
B. An RF jammer is used to prevent the rogue AP from transmitting.
C. An authorized AP spoofs de-authentication packets that have the spoofed source address of the rogue AP.
D. A trusted AP is configured to mimic the rogue AP and to prevent clients from associating to the rogue AP.

cisco-exams

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.