FUNDAMENTALS OF COMPUTER

TELECOMMUNICATIONS SYSTEMS

COMMUNICATION WIRELESS COMPUTING DEVICES

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Which of these is a vulnerability of MAC address filtering?
A
The user must enter the MAC.
B
MAC addresses are initially exchanged between wireless devices and the AP in an unencrypted format.
C
APs use IP addresses instead of MACs.
D
Not all operating systems support MACs.
Explanation: 

Detailed explanation-1: -MAC address filtering is actually far from safe, as it’s very easy to spoof a MAC address and gain access to the network unnoticed. Moreover, as MAC address filtering does give companies a false sense of security, it makes them extra vulnerable to security breaches.

Detailed explanation-2: -Disadvantages of MAC filtering It is only effective if the hacker does not have access to either of the two pieces of information: The MAC address whitelist of the network. At least one of the MAC addresses of a device connected to the network (in case of a blacklisted MAC filtering system)

Detailed explanation-3: -MAC address filtering allows you to block traffic coming from certain known machines or devices. The router uses the MAC address of a computer or device on the network to identify it and block or permit the access. Traffic coming in from a specified MAC address will be filtered depending upon the policy.

Detailed explanation-4: -MAC Address Filtering Provides No Security But MAC addresses can be easily spoofed in many operating systems, so any device could pretend to have one of those allowed, unique MAC addresses.

There is 1 question to complete.