What is the purpose of MAC address filtering and how can attackers defeat it?

What will be an ideal response?

One of the most basic security mechanisms in wireless networks is MAC address filtering.  MAC addresses of legitimate stations are entered manually in the configuration interface of the AP's MAC address table, and only recognized stations can connect to the AP. However,
attackers get around this mechanism by sniffing the network to find legitimate MAC addresses, and then they alter frames by using those values. This tactic is called MAC address spoofing. The injected frame appears to be from a legitimate source, so attackers can connect to the AP and network.

Computer Science & Information Technology

You might also like to view...

The ________ ________ Effect dialog box displays additional entrance effects grouped in four categories

Fill in the blank(s) with correct word

Computer Science & Information Technology

FireWire supports the following speeds:

A) 33Mbps/66Mbps/133Mbps/266Mbps/300Mbps B) 66Mbps/133Mbps/533Mbps/1066Mbps C) 10Mbps/20Mbps/60Mbps/100Mbps/120Mbps D) 100Mbps/200Mbps/400Mbps/800Mbps/1200/1600/3200Mbps

Computer Science & Information Technology