A company uses port security based on an approved MAC list to secure its wired network and WPA2 to secure its wireless network. Which of the following prevents an attacker from learning authorized MAC addresses?

A. Port security prevents access to any traffic that might provide an attacker with authorized MAC addresses
B. Port security uses certificates to authenticate devices and is not part of a wireless protocol
C. Port security relies in a MAC address length that is too short to be cryptographically secure over wireless networks
D. Port security encrypts data on the network preventing an attacker form reading authorized MAC addresses


Answer: A. Port security prevents access to any traffic that might provide an attacker with authorized MAC addresses

Computer Science & Information Technology

You might also like to view...

What LINUX and UNIX utilities can be used for creating and manipulating libraries?

What will be an ideal response?

Computer Science & Information Technology

The search tool in OS X is called ________

A) My Stuff B) File Explorer C) Search Box D) Spotlight

Computer Science & Information Technology

Which of the following is not true about enterprise computing and metrics?

A) Metrics can be financial based, customer service based, or performance based. B) In enterprise computing, implementation of the system is not the end of the process. You have to evaluate whether your choices were the best or whether additional changes are needed. C) Performance metrics measure an organization's activities and performance. D) Successful metrics will provide feedback on five different criteria: time, cost, resources, quality, and actions regarding your product or project.

Computer Science & Information Technology

It is good practice to dedicate a proxy server to one ____________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology