Access control is often implemented through the use of MAC address filtering on wireless Access Points.
Why is this considered to be a very limited security measure?
A . Vendors MAC address assignment is published on the Internet.
B . The MAC address is not a real random number.
C . The MAC address is broadcasted and can be captured by a sniffer.
D . The MAC address is used properly only on Macintosh computers.
Answer: C