Ann, the network administrator, is receiving reports regarding a particular wireless network in the building. The
network was implemented for specific machines issued to the developer department, but the developers are
stating that they are having connection issues as well as slow bandwidth. Reviewing the wireless router’s logs,
she sees that devices not belonging to the developers are connecting to the access point. Which of the
following would BEST alleviate the developer’s reports?
Configure the router so that wireless access is based upon the connecting device’s hardware address.
Modify the connection’s encryption method so that it is using WEP instead of WPA2.
Implement connections via secure tunnel with additional software on the developer’s computers.
Configure the router so that its name is not visible to devices scanning for wireless networks.
MAC addresses are also known as an Ethernet hardware address (EHA), hardware address or physical
address. Enabling MAC filtering would allow for a WAP to restrict or allow access based on the hardware
address of the device.