A network administrator argues that WPA2 encryption is not needed, as MAC filtering is enabled on the access
point. Which of the following would show the administrator that wpa2 is also needed?
Deploy an evil twin with mac filtering
Flood access point with random mac addresses
Sniff and clone a mac address
DNS poison the access point