You work as the security administrator for your organization. In relation to the WLAN, you are viewing a dashboard that shows security threat, policy compliance and
rogue threat charts. What type of system is in view?

A.
Wireshark Protocol Analyzer
B.
Wireless VPN Management Systems
C.
Wireless Intrusion Prevention System
D.
Distributed RF Spectrum Analyzer
E.
WLAN Emulation System