In the course of troubleshooting wireless issues from users a technician discovers that users are connecting to their home SSIDs which the technician scans but detects none of these SSIDs. The technician eventually discovers a rouge access point that spoofs any SSID request. Which of the following allows wireless use while mitigating this type of attack?

A. Configure the device to verify access point MAC addresses
B. Disable automatic connection to known SSIDs
C. Only connect to trusted wireless networks
D. Enable MAC filtering on the wireless access point

Answer: A. Configure the device to verify access point MAC addresses

Computer Science & Information Technology

You might also like to view...

To what would you compare the transport layer?

a. data links b. the post office c. driving a car d. a train

Computer Science & Information Technology

What is the purpose of the OLE feature?

A) Open a document even if you do not have the native application. B) Make a file smaller by compressing its contents. C) Password protect a document so that it cannot be opened without the password. D) Insert an object into a document which was created in another document.

Computer Science & Information Technology