PrepAway - Latest Free Exam Questions & Answers

Which of the following wireless attacks would this address?

Pete, the security engineer, would like to prevent wireless attacks on his network. Pete has
implemented a security control to limit the connecting MAC addresses to a single port. Which of

the following wireless attacks would this address?

PrepAway - Latest Free Exam Questions & Answers

A.
Interference

B.
Man-in-the-middle

C.
ARP poisoning

D.
Rogue access point

Explanation:
MAC filtering is typically used in wireless networks. In computer networking, MAC Filtering (or GUI
filtering, or layer 2 address filtering) refers to a security access control method whereby the 48-bit
address assigned to each network card is used to determine access to the network.
MAC addresses are uniquely assigned to each card, so using MAC filtering on a network permits
and denies network access to specific devices through the use of blacklists and whitelists.
In this question, a rogue access point would need to be able to connect to the network to provide
access to network resources. If the MAC address of the rogue access point isn’t allowed to
connect to the network port, then the rogue access point will not be able to connect to the network.


Leave a Reply