PrepAway - Latest Free Exam Questions & Answers

When using a Wireless Network Management System (WNMS), how are rogue access points discovered?

When using a Wireless Network Management System (WNMS), how are rogue access points discovered?

PrepAway - Latest Free Exam Questions & Answers

A.
Authorized access points report all BSSID values they can hear to the WNMS via SNMP. The BSSID values are compared against an authorized access point list.

B.
All Wi-Fi devices have an RFID fingerprint that can be used by WNMS sensors to identify unauthorized devices such as rogue APs.

C.
Dedicated sensor access points are deployed throughout the coverage area. Sensor APs report directly to the WNMS using the RDP protocol.

D.
WNMS platforms connect to an up-to-date rogue AP database maintained by the WNMS manufacturer over the Internet.

E.
Proprietary detection protocols run on the dual-band ERP/OFDM access points and report all discovered access points to the WNMS analytics engine using HTTP.


Leave a Reply