In the course of troubleshooting wireless issues from users, a technician discovers that users are connecting to
their home SSIDs while at work. The technician scans but detects none of those SSIDs. The technician
eventually discovers a rouge access point that spoofs any SSID request. Which of the following allows wireless
use while mitigating this type of attack?
Configure the device to verify access point MAC addresses.
Disable automatic connection to known SSIDs.
Only connect to trusted wireless networks.
Enable MAC filtering on the wireless access point.