Pete, the security engineer, would like to prevent wireless attacks on his network. Pete has implemented a security control to limit the connecting MAC addresses to a single port. Which of the following wireless attacks would this address?
A.
Interference
B.
Man-in-the-middle
C.
ARP poisoning
D.
Rogue access point
D