kathy4065 kathy4065 30-12-2022 Computers and Technology Answered an attacker used an illegal access point (ap) with a very strong signal near a wireless network. if the attacker performed a jamming attack, which of the following would mitigate this type of network disruption? (select all that apply.)