Which of the below statement is correct with regards to configuring local MAC authentication on an
AP?
A.
A MAC address can be spoofed, so it is insecure.
B.
The MAC address is used in stead of the username in the EAP certificate exchange.
C.
The MAC address may be used in the key hash, if WEP is used as a key cipher.
D.
MAC address authentication can not co-exist with EAP authentication.
A MAC address can be spoofed, so it is insecure.