an attacker used an illegal access point (ap) with a very strong signal near a wireless network. if the attacker performed a jamming attack, which of the following would mitigate this type of network disruption? (select all that apply.)