Ann, the network administrator, is receiving reports regarding a particular wireless network in the
building. The network was implemented for specific machines issued to the developer department, but
the developers are stating that they are having connection issues as well as slow bandwidth. Reviewing
the wireless router’s logs, she sees that devices not belonging to the developers are connecting to the
access point. Which of the following would BEST alleviate the developer’s reports?

A.
Configure the router so that wireless access is based upon the connecting device’s hardware address.
B.
Modify the connection’s encryption method so that it is using WEP instead of WPA2.
C.
Implement connections via secure tunnel with additional software on the developer’s computers.
D.
Configure the router so that its name is not visible to devices scanning for wireless networks.
Explanation:
MAC addresses are also known as an Ethernet hardware address (EHA), hardware address or physical
address. Enabling MAC filtering would allow for a WAP to restrict or allow access based on the hardware
address of the device.
Incorrect Answers:
B: WPA2 is more secure that WEP.
C: This answer will not prevent devices not belonging to the developer department from connecting to
the access point.
D: Hiding the SSID could work, but hackers with basic wireless knowledge can easily discover it.
https://en.wikipedia.org/wiki/MAC_address
Stewart, James Michael, CompTIA Security+ Review Guide, Sybex, Indianapolis, 2014, pp. 59-63