Describe one weakness of MAC address filtering.
What will be an ideal response?
Managing the number of MAC addresses in a medium to large sized wireless network can pose significant challenges. As new users are added to the network and old users leave, MAC address filtering demands constant attention.
MAC addresses are initially exchanged in cleartext. This means that an attacker can easily see the MAC address of an approved device and use it to join the network.
A MAC address can be "spoofed" or substituted.
Computer Science & Information Technology
You might also like to view...
The ________ button can be used to combine two or more cells into one
Fill in the blank(s) with correct word
Computer Science & Information Technology
For most standard documents, Microsoft suggests writers should aim for the Flesch Reading Ease score of _____.
A. 10-20 B. 30-40 C. 60-70 D. 90-100
Computer Science & Information Technology