COMPUTER NETWORKING

WIRELESS NETWORKS AND MOBILE IP

INTRODUCTION

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Which of these is a vulnerability of MAC address filtering?
A
The user must enter the MAC.
B
MAC addresses are initially exchanged between wireless devices and the AP in an unencrypted format.
C
APs use IP addresses instead of MACs.
D
Not all operating systems support MACs.
Explanation: 

Detailed explanation-1: -MAC address filtering or MAC filtering is an access control method in which your router does MAC authentication before allowing any device to gain network access. In the MAC address filtering process, your router checks the MAC address of each device before granting or denying access to the network.

Detailed explanation-2: -How is MAC Address vulnerable? Attacks on MAC addresses require extensive knowledge but if one gains access to it, they can use that to monitor your location, disrupt your Internet access and perform man-in-the-middle-attack (MITM).

Detailed explanation-3: -MAC Address Filtering Provides No Security But MAC addresses can be easily spoofed in many operating systems, so any device could pretend to have one of those allowed, unique MAC addresses.

There is 1 question to complete.