PrepAway - Latest Free Exam Questions & Answers

which method is a rogue contained?

In an infrastructure based on a wireless advanced feature set using lightweight access points, by which method is a rogue contained?

PrepAway - Latest Free Exam Questions & Answers

A.
The WCS sends excessive traffic to the rogue thus overloading the access point.

B.
The rogue MAC address is used to spoof broadcastdeassociation packets.

C.
The rogue MAC address is used to spoof broadcastdeauthentication packets.

D.
The WCS sends out excessive signals on the same channel when the rogue is detected.


Leave a Reply