In the course of troubleshooting wireless issues from users a technician discovers that users are connecting to their home SSIDs which the technician scans but detects none of these SSIDs. The technician eventually discovers a rouge access point that spoofs any SSID request. Which of the following allows wireless use while mitigating this type of attack?

A. Configure the device to verify access point MAC addresses
B. Disable automatic connection to known SSIDs
C. Only connect to trusted wireless networks
D. Enable MAC filtering on the wireless access point


Answer: A. Configure the device to verify access point MAC addresses

Computer Science & Information Technology

You might also like to view...

What policy informs users of proper system usage?

What will be an ideal response?

Computer Science & Information Technology

Compare and contrast stateful versus stateless packet filtering

What will be an ideal response?

Computer Science & Information Technology

Alt+F8 is the key combination that closes pop-up windows

Indicate whether the statement is true or false

Computer Science & Information Technology

The encryption password is different from the passwords that prevent users from editing a worksheet or the entire workbook.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology