Which of the following wireless attacks would this address?

Pete, the security engineer, would like to prevent wireless attacks on his network. Pete has implemented a security control to limit the connecting MAC addresses to a single port. Which of the following wireless attacks would this address?

Pete, the security engineer, would like to prevent wireless attacks on his network. Pete has implemented a security control to limit the connecting MAC addresses to a single port. Which of the following wireless attacks would this address?

A.
Interference

B.
Man-in-the-middle

C.
ARP poisoning

D.
Rogue access point



Leave a Reply 1

Your email address will not be published. Required fields are marked *