Pete, the security engineer, would like to prevent wireless attacks on his network. Pete has implemented a
security control to limit the connecting MAC addresses to a single port. Which of the following wireless attacks
would this address?
Rogue access point
MAC filtering is typically used in wireless networks. In computer networking, MAC Filtering (or GUI filtering, or
layer 2 address filtering) refers to a security access control method whereby the 48-bit address assigned to
each network card is used to determine access to the network.
MAC addresses are uniquely assigned to each card, so using MAC filtering on a network permits and denies
network access to specific devices through the use of blacklists and whitelists.
In this question, a rogue access point would need to be able to connect to the network to provide access to
network resources. If the MAC address of the rogue access point isn’t allowed to connect to the network port,
then the rogue access point will not be able to connect to the network.