A security analyst recently discovered two unauthorized hosts on the campus’s wireless network segment from a man-m-the-middle attack .The security analyst also verified that privileges were not escalated, and the two devices did not gain access to other network devices.
Which of the following would BEST mitigate and improve the security posture of the wireless network for this type of attack?
A . Enable MAC filtering on the wireless router and suggest a stronger encryption for the wireless network,
B . Change the SSID, strengthen the passcode, and implement MAC filtering on the wireless router.
C . Enable MAC filtering on the wireless router and create a whitelist that allows devices on the network
D . Conduct a wireless survey to determine if the wireless strength needs to be reduced.
Answer: A
Leave a Reply