Which of the following options can be used to restrict what devices can be physically connected to a network based on a MAC address?
Correct Incorrect Unanswered Report Issue Answer Description
Port Security also known as MAC Filtering is used to restrict which devices can physically connect to the network. This is done by whitelisting which MAC addresses (the physical address of a Networking Interface Card (NIC) are permitted on the network. It is most commonly done where a network port like an RJ-45 is publicly accessible like in an office waiting area.
Wikipedia
In computer networking, MAC address filtering is a security access control method whereby the MAC address assigned to each network interface controller is used to determine access to the network.
MAC addresses are uniquely assigned to each card, so using MAC filtering on a network permits and denies network access to specific devices through the use of blacklists and whitelists. While the restriction of network access through the use of lists is straightforward, an individual person is not identified by a MAC address, rather a device only, so an authorized person will need to have a whitelist entry for each device that they would like to access the network.
While giving a network some additional protection, MAC filtering can be circumvented by using a packet analyzer to find a valid MAC and then using MAC spoofing to access the network using that address. MAC address filtering can be considered as security through obscurity because the effectiveness is based on "the secrecy of the implementation or its components".
MAC_filtering - Wikipedia, the free encyclopedia Subscribe to avoid duplicate questions and track your progress over time