PrepAway - Latest Free Exam Questions & Answers

which method is a rogue contained?

In an infrastructure based on a wireless advanced feature set using lightweight access points, by which method is a rogue contained?

PrepAway - Latest Free Exam Questions & Answers

A.
The WCS sends excessive traffic to the rogue, thus overloading the access point.

B.
The rogue MAC address is used to spoof broadcast deassociation packets.

C.
The rogue MAC address is used to spoof broadcast deauthentication packets.

D.
The WCS sends out excessive signals on the same channel when the rogue is detected.


Leave a Reply