A network administrator is in the process of taking steps to harden the network. In an effort to better secure the wireless network, the administrator updated the configuration to only allow devices to access the network that have been explicitly given access. What is the best way this can be accomplished on a wireless network?
Correct Incorrect Unanswered Report Issue Answer Description
MAC filtering allows for the whitelisting of hosts within a wireless network by MAC address where only designated MAC addresses are allowed to connect to the access point. Port security allows for a similar function but the whitelisted MAC address are assigned to ports on a network device.
Wikipedia
In computer networking, MAC address filtering is a security access control method whereby the MAC address assigned to each network interface controller is used to determine access to the network.
MAC addresses are uniquely assigned to each card, so using MAC filtering on a network permits and denies network access to specific devices through the use of blacklists and whitelists. While the restriction of network access through the use of lists is straightforward, an individual person is not identified by a MAC address, rather a device only, so an authorized person will need to have a whitelist entry for each device that they would like to access the network.
While giving a network some additional protection, MAC filtering can be circumvented by using a packet analyzer to find a valid MAC and then using MAC spoofing to access the network using that address. MAC address filtering can be considered as security through obscurity because the effectiveness is based on "the secrecy of the implementation or its components".
MAC_filtering - Wikipedia, the free encyclopedia Subscribe to avoid duplicate questions and track your progress over time