A network administrator argues that WPA2 encryption is not needed, as MAC filtering is enabled on the access
point. Which of the following would show the administrator that wpa2 is also needed?
A.
Deploy an evil twin with mac filtering
B.
Flood access point with random mac addresses
C.
Sniff and clone a mac address
D.
DNS poison the access point