Which of the following commands would help you locate the rogue access point from the wlp1s0 interface and produce the results shown? You are a cybersecurity consultant. The company hiring you suspects that employees are connecting to a rogue access point (AP). You need to find the name of the hidden rogue AP so it can be deauthorized.
Comments