A network administrator argues that WPA2 encryption is not needed, as MAC filtering is enabled on the access point. Which of the following would show the administrator that wpa2 is also needed?
A. Deploy an evil twin with mac filtering
B. Flood access point with random mac addresses
C. Sniff and clone a mac address
D. DNS poison the access point
Answer: C. Sniff and clone a mac address
Computer Science & Information Technology
You might also like to view...
________ is the process of modifying some aspect of a presentation primarily by changing the contents of individual slides
A) Presenting B) Formatting C) Saving D) Editing
Computer Science & Information Technology
Chart buttons are displayed when the ________ of the chart is clicked
A) data marker B) legend C) border D) caption
Computer Science & Information Technology