What are Two Valid Weaknesses of Utilizing Mac Filtering for Controlling Wireless Network Access??

Posted in  mac | 2022-03-18

Security Exam Flashcards

What are two valid weaknesses of utilizing MAC filtering for controlling wireless network access? MAC addresses are initially exchanged between wireless devices and the AP in unencrypted format. Filtering by MAC address requires significant administrative overhead to maintain the list of allowed MACs.

What is a Valid Disadvantage of the Use of a Software Firewall Versus Using a Hardware Firewall?

What is a valid disadvantage of the use of a software firewall versus using a hardware firewall? Software firewalls are harder to configure and maintain than a hardware firewall. A malware infection on the machine could compromise the software firewall processes.

What are the Two Different Types of One Time Password that can be Created Choose Two?

There are two types of OTP: HOTP and TOTP.

What are the Two Different Methods for Performing a Vulnerability Scan Choose Two?

There are two approaches to network vulnerability scanning, active and passive. The active approach encompasses everything an organization does to foil system breaches, while the passive (or monitoring) approach entails all the ways the organization oversees system security.

How is Confidentiality Ensured Using the IPsec VPN Protocol?

How is confidentiality ensured using the IPsec VPN protocol? By using the Encapsulating Security Payload (ESP) protocol.