Pete, the security engineer, would like to prevent wireless attacks on his network. Pete has implemented a security control to limit the connecting MAC addresses to a single port. Which of the following wireless attacks would this address?

Pete, the security engineer, would like to prevent wireless attacks on his network. Pete has implemented a security control to limit the connecting MAC addresses to a single port. Which of the following wireless attacks would this address?






A. Interference

B. Man-in-the-middle

C. ARP poisoning

D. Rogue access point






Answer: D


Computer Science

Learn More Multiple Choice Question :