Here’s the Answer to the Question posted on Facebook
Q. You maintain a wireless network that is using MAC filtering to restrict access. You suspect that attackers have discovered MAC addresses and are spoofing them to gain access. What would they have used to discover these MAC addresses?
B. Protocol analyzer
Answer available until June 11, 2015.