A network administrator argues that WPA2 encryption is not needed, as MAC filtering is enabled on the access point. Which of the following would show the administrator that wpa2 is also needed?

A. Deploy an evil twin with mac filtering
B. Flood access point with random mac addresses
C. Sniff and clone a mac address
D. DNS poison the access point


Answer: C. Sniff and clone a mac address

Computer Science & Information Technology

You might also like to view...

If the name of the input file was in a variable named filename, which of the following is the correct way to open the input stream named inFile and associate it with this file?

a. inFile.open(filename); b. inFile=filename; c. inFile="filename"; d. inFile.open("filename");

Computer Science & Information Technology

A variable that has ____ scope can be used anywhere within the procedure.

A. global B. procedure C. internal D. block

Computer Science & Information Technology

Why is memory management necessary in a system that uses hard disks?

What will be an ideal response?

Computer Science & Information Technology

Which of the following is a flawed wireless authentication standard created to allow users to easily add devices to a wireless network securely?

A. WPS B. WSS C. WEP D. AES

Computer Science & Information Technology