Which of the following tools monitors the radio spectrum for the presence of unauthorized, rogue access points and the use of wireless attack tools?
IDS
Firewall
Snort
WIPS
Submit