Which of the below statement is correct with regards to configuring local MAC authentication on an
AP?
A.
A MAC address can be spoofed, so it is insecure.
B.
The MAC address is used instead of the username in the EAP certificate exchange.
C.
The MAC address may be used in the key hash, if WEP is used as a key cipher.
D.
MAC address authentication cannot co-exist with EAP authentication.