With a Rogue Access Point a malacious user sets up their own access point that Legitimate users mistake as a legitimate access point
The Rogue user can now monitor all the traffic
The Rogue point will even use the same SSID as the legitimate Access points