What is the purpose of MAC address filtering and how can attackers defeat it?
What will be an ideal response?
One of the most basic security mechanisms in wireless networks is MAC address filtering. MAC addresses of legitimate stations are entered manually in the configuration interface of the AP's MAC address table, and only recognized stations can connect to the AP. However,
attackers get around this mechanism by sniffing the network to find legitimate MAC addresses, and then they alter frames by using those values. This tactic is called MAC address spoofing. The injected frame appears to be from a legitimate source, so attackers can connect to the AP and network.
You might also like to view...
The ________ ________ Effect dialog box displays additional entrance effects grouped in four categories
Fill in the blank(s) with correct word
FireWire supports the following speeds:
A) 33Mbps/66Mbps/133Mbps/266Mbps/300Mbps B) 66Mbps/133Mbps/533Mbps/1066Mbps C) 10Mbps/20Mbps/60Mbps/100Mbps/120Mbps D) 100Mbps/200Mbps/400Mbps/800Mbps/1200/1600/3200Mbps