Which statement about MAC filtering is true?

Prepare for the Certified Ethical Hacker Version 11 Exam with a comprehensive test featuring flashcards and multiple choice questions, each accompanied by hints and explanations to ensure a thorough understanding. Ace your ethical hacking exam with confidence!

Multiple Choice

Which statement about MAC filtering is true?

Explanation:
MAC filtering works by allowing only devices with specific hardware addresses to connect. But those addresses are not a secret and can be changed on most devices. An attacker can clone a trusted device’s MAC address or simply set their own device to use an allowed MAC, slipping past the filter. That makes MAC filtering fundamentally weak as a security measure because it offers no real protection against someone who can impersonate an approved device. It also does not provide encryption, does not require centralized authentication, and cannot reliably defend against rogue APs. For these reasons, the statement that MAC filtering is easy to bypass by MAC spoofing is the most accurate.

MAC filtering works by allowing only devices with specific hardware addresses to connect. But those addresses are not a secret and can be changed on most devices. An attacker can clone a trusted device’s MAC address or simply set their own device to use an allowed MAC, slipping past the filter. That makes MAC filtering fundamentally weak as a security measure because it offers no real protection against someone who can impersonate an approved device. It also does not provide encryption, does not require centralized authentication, and cannot reliably defend against rogue APs. For these reasons, the statement that MAC filtering is easy to bypass by MAC spoofing is the most accurate.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy