Describe one weakness of MAC address filtering.

What will be an ideal response?


Managing the number of MAC addresses in a medium to large sized wireless network can pose significant challenges. As new users are added to the network and old users leave, MAC address filtering demands constant attention.
MAC addresses are initially exchanged in cleartext. This means that an attacker can easily see the MAC address of an approved device and use it to join the network.
A MAC address can be "spoofed" or substituted.

Computer Science & Information Technology

You might also like to view...

The normal way to make certain that a compromise does not happen is to put technical or ____ controls in place to ensure the security of all items that have to be protected.

A. psychological B. behavioral C. personal D. barrier

Computer Science & Information Technology

What will be output by the following statement?

cout << showpoint << setprecision(4) << 11.0 << endl; a. 11 b. 11.0 c. 11.00 d. 11.000

Computer Science & Information Technology

Datagram sockets would be a good choice for transmitting

A. automated teller machine transactions B. background music for elevators

Computer Science & Information Technology

You open the Pattern Options panel by selecting an object on the artboard, clicking the Edit menu, and then clicking Make.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology