Which of the following is the BEST security method to implement on the access points?

A wireless network technician for a local retail store is installing encrypted access points within the store for real-time inventory verification, as well as remote price checking capabilities, while employees are away from the registers. The store is in a fully occupied strip mall that has multiple neighbors allowing guest access to the wireless networks. There are a finite known number of approved handheld devices needing to access the store’s wireless network.

Which of the following is the BEST security method to implement on the access points?
A . Port forwarding
B . MAC filtering
C . TLS/TTLS
D . IP ACL

Answer: B

Explanation:

MAC filtering allows traffic to be permitted or denied based on a device’s MAC address. We make a MAC filtering which contains the MAC addresses of all approved devices that need to access the wireless network. This ensures that only approved devices are given access to the network.

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments