A network administrator argues that WPA2 encryption is not needed, as MAC filtering is enabled on the access point. Which of the following would show the administrator that wpa2 is also needed?
A. Deploy an evil twin with mac filtering
B. Flood access point with random mac addresses
C. Sniff and clone a mac address
D. DNS poison the access point
Answer: C. Sniff and clone a mac address
You might also like to view...
If the name of the input file was in a variable named filename, which of the following is the correct way to open the input stream named inFile and associate it with this file?
a. inFile.open(filename); b. inFile=filename; c. inFile="filename"; d. inFile.open("filename");
A variable that has ____ scope can be used anywhere within the procedure.
A. global B. procedure C. internal D. block
Why is memory management necessary in a system that uses hard disks?
What will be an ideal response?
Which of the following is a flawed wireless authentication standard created to allow users to easily add devices to a wireless network securely?
A. WPS B. WSS C. WEP D. AES