Which statement about the process of rogue containment performed on a rogue AP and rogue clients is true?
A. Trusted clients are configured to ignore the rogue AP so that only the rogue clients can connect.
B. An RF jammer is used to prevent the rogue AP from transmitting.
C. An authorized AP spoofs de-authentication packets that have the spoofed source address of the rogue AP.
D. A trusted AP is configured to mimic the rogue AP and to prevent clients from associating to the rogue AP.