Question: Some wireless environments authenticate wireless devices before they are allowed access to the wired environment, via SSID and/or MAC values. Which of the following best describes the downfall of these approaches?
A. Both are easily captured through brute force attacks.
B. The SSID is broadcasted by the wireless device and the MAC address is broadcasted by the access point.
C. The MAC is not broadcasted by the wireless device and the SSID address is broadcasted by the access point.
D. Both are sent in cleartext.

Download pdf (with explanations) edition of this exam.