A company uses port security based on an approved MAC list to secure its wired network and WPA2 to secure its wireless network. Which of the following prevents an attacker from learning authorized MAC addresses?
A. Port security prevents access to any traffic that might provide an attacker with authorized MAC addresses
B. Port security uses certificates to authenticate devices and is not part of a wireless protocol
C. Port security relies in a MAC address length that is too short to be cryptographically secure over wireless networks
D. Port security encrypts data on the network preventing an attacker form reading authorized MAC addresses
Answer: A. Port security prevents access to any traffic that might provide an attacker with authorized MAC addresses
You might also like to view...
A(n) _____________________ is a list collection has elements whose elements can be referenced using a numeric index.
a) ordered list b) unordered list c) indexed list d) linked list e) array
Microsoft Access does not allow spaces within table names and field names.
Answer the following statement true (T) or false (F)