Which of the following allows wireless use while mitiga…

In the course of troubleshooting wireless issues from users, a technician discovers that users are connecting to their home SSIDs while at work. The technician
scans detects none of those SSIDs. The technician eventually discovers a rogue access point that spoofs any SSID that a client requests. Which of the following
allows wireless use while mitigating this type of attack?

In the course of troubleshooting wireless issues from users, a technician discovers that users are connecting to their home SSIDs while at work. The technician
scans detects none of those SSIDs. The technician eventually discovers a rogue access point that spoofs any SSID that a client requests. Which of the following
allows wireless use while mitigating this type of attack?

A.
Configure the device to verify access point MAC addresses

B.
Disable automatic connection to unknown SSIDs

C.
Only connect to trusted wireless networks

D.
Enable MAC filtering on the wireless access point



Leave a Reply 0

Your email address will not be published. Required fields are marked *

11 − 1 =