When a rogue access point is contained, clients will be unable to connect to the rogue AP. Additionally, any currently associated clients will lose their connection to the rogue AP.
https://documentation.meraki.com/MR/Monitoring_and_Reporting/Air_Marshal
A Cisco Meraki AP accomplishes containment by sending deauthentication packets with the spoofed MAC address of the rogue access point (the BSSID of the rogue wireless network). The deauthentication packets force any clients that are connected to the rogue access point to disconnect. If a client attempts to connect to the rogue network, they will be immediately forced off by the Air Marshal.
I think the question is "malicious" 'cause is not saying that the user is connected in the rogue SSID, is saying that the Air Marshall has identified this rogue SSID, so for me the answer is: A & D
When a rogue access point is contained, clients will be unable to connect to the rogue AP. Additionally, any currently associated clients will lose their connection to the rogue AP.
https://documentation.meraki.com/MR/Monitoring_and_Reporting/Air_Marshal
upvoted 1 times
...
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
azjlmpang
Highly Voted 1 year, 10 months agosattori
Most Recent 1 week agornunes1110
1 year agornunes1110
1 year, 1 month agornunes1110
1 year agoazjlmpang
1 year, 10 months ago