A network administrator argues that WPA2 encryption is not needed, as MAC filtering is enabled on the access point. Which of the following would show the administrator that wpa2 is also needed?

A. Deploy an evil twin with mac filtering
B. Flood access point with random mac addresses
C. Sniff and clone a mac address
D. DNS poison the access point

Answer: C. Sniff and clone a mac address

Computer Science & Information Technology

You might also like to view...

________ is the process of modifying some aspect of a presentation primarily by changing the contents of individual slides

A) Presenting B) Formatting C) Saving D) Editing

Computer Science & Information Technology

Chart buttons are displayed when the ________ of the chart is clicked

A) data marker B) legend C) border D) caption

Computer Science & Information Technology