Which statement about MAC filtering is true?

Prepare for the Certified Ethical Hacker Version 11 Exam. Study with comprehensive questions and explanations. Equip yourself with the skills needed for success!

Multiple Choice

Which statement about MAC filtering is true?

Explanation:
MAC filtering works by allowing only devices with specific hardware addresses to connect. But those addresses are not a secret and can be changed on most devices. An attacker can clone a trusted device’s MAC address or simply set their own device to use an allowed MAC, slipping past the filter. That makes MAC filtering fundamentally weak as a security measure because it offers no real protection against someone who can impersonate an approved device. It also does not provide encryption, does not require centralized authentication, and cannot reliably defend against rogue APs. For these reasons, the statement that MAC filtering is easy to bypass by MAC spoofing is the most accurate.

MAC filtering works by allowing only devices with specific hardware addresses to connect. But those addresses are not a secret and can be changed on most devices. An attacker can clone a trusted device’s MAC address or simply set their own device to use an allowed MAC, slipping past the filter. That makes MAC filtering fundamentally weak as a security measure because it offers no real protection against someone who can impersonate an approved device. It also does not provide encryption, does not require centralized authentication, and cannot reliably defend against rogue APs. For these reasons, the statement that MAC filtering is easy to bypass by MAC spoofing is the most accurate.

Subscribe

Get the latest from Passetra

You can unsubscribe at any time. Read our privacy policy