Which of the following techniques are used to secure wireless networks?
Each correct answer represents a complete solution. Choose three.
A . MAC address filtering
B . SSID spoofing
C . IP spoofing
D . Closed network
Answer: A,B,D
Which of the following techniques are used to secure wireless networks?
Each correct answer represents a complete solution. Choose three.
A . MAC address filtering
B . SSID spoofing
C . IP spoofing
D . Closed network
Answer: A,B,D