Which wireless security technique is most susceptible to spoofing?

Which wireless security technique is most susceptible to spoofing?

Which wireless security technique is most susceptible to spoofing?

A.
802.11i

B.
Beaconing

C.
MAC address filtering

D.
Wired Equivalent Privacy (WEP)

Explanation:



Leave a Reply 0

Your email address will not be published. Required fields are marked *