A wireless network technician for a local retail store is installing encrypted access points within the store for real-time inventory verification, as well as remote price
checking capabilities, while employees are away from the registers. The store is in a fully occupied strip mall that has multiple neighbors allowing guest access to
the wireless networks. There are a finite known number of approved handheld devices needing to access the store’s wireless network. Which of the following is the
BEST security method to implement on the access points?
MAC filtering allows traffic to be permitted or denied based on a device’s MAC address. We make a MAC filtering which contains the MAC addresses of all
approved devices that need to access the wireless network. This ensures that only approved devices are given access to the network.