{"id":59209,"date":"2024-04-16T01:33:07","date_gmt":"2024-04-16T01:33:07","guid":{"rendered":"https:\/\/exam.pscnotes.com\/mcq\/?p=59209"},"modified":"2024-04-16T01:33:07","modified_gmt":"2024-04-16T01:33:07","slug":"on-wireless-networks-filtering-is-the-security-measure","status":"publish","type":"post","link":"https:\/\/exam.pscnotes.com\/mcq\/on-wireless-networks-filtering-is-the-security-measure\/","title":{"rendered":"On wireless networks . . . . . . . . filtering is the security measure."},"content":{"rendered":"<p>[amp_mcq option1=&#8221;oui&#8221; option2=&#8221;ip&#8221; option3=&#8221;nic&#8221; option4=&#8221;mca&#8221; correct=&#8221;option1&#8243;]<!--more--><\/p>\n<p>The correct answer is: <strong>MAC filtering<\/strong>.<\/p>\n<p>MAC filtering is a security measure used on wireless networks to control which devices are allowed to connect to the network. It works by blocking all devices whose MAC addresses are not on a list of approved devices. This can help to prevent unauthorized access to the network.<\/p>\n<p>MAC addresses are unique identifiers assigned to network interfaces. They are usually 12 characters long and are written in hexadecimal format. For example, a MAC address might look like this: 00:11:22:33:44:55.<\/p>\n<p>To set up MAC filtering on a wireless network, you will need to find the MAC addresses of the devices that you want to allow to connect. You can usually find this information in the network settings of your device. Once you have the MAC addresses, you can add them to the list of approved devices on your wireless router.<\/p>\n<p>MAC filtering is a relatively simple and effective security measure. However, it is important to note that it is not foolproof. There are ways for attackers to bypass MAC filtering, such as by using MAC spoofing. Therefore, it is important to use MAC filtering in conjunction with other security measures, such as WPA2 encryption.<\/p>\n<p>The other options are incorrect because:<\/p>\n<ul>\n<li><strong>OUI<\/strong> stands for Organizationally Unique Identifier. It is a 12-digit code that is assigned to network interface manufacturers by the Institute of Electrical and Electronics Engineers (IEEE). OUIs are used to identify the manufacturer of a network interface.<\/li>\n<li><strong>IP<\/strong> stands for Internet Protocol. It is a set of rules that govern how data is transmitted over a network. IP addresses are used to identify devices on a network.<\/li>\n<li><strong>NIC<\/strong> stands for Network Interface Card. It is a hardware device that allows a computer to connect to a network. NICs have a unique MAC address.<\/li>\n<li><strong>MCA<\/strong> stands for Media Access Control. It is a set of rules that govern how devices access a network. MAC addresses are used to identify devices on a network.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>[amp_mcq option1=&#8221;oui&#8221; option2=&#8221;ip&#8221; option3=&#8221;nic&#8221; option4=&#8221;mca&#8221; correct=&#8221;option1&#8243;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[730],"tags":[],"class_list":["post-59209","post","type-post","status-publish","format-standard","hentry","category-internet-of-things-iot","no-featured-image-padding"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.2 (Yoast SEO v23.3) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>On wireless networks . . . . . . . . filtering is the security measure.<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/exam.pscnotes.com\/mcq\/on-wireless-networks-filtering-is-the-security-measure\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"On wireless networks . . . . . . . . filtering is the security measure.\" \/>\n<meta property=\"og:description\" content=\"[amp_mcq option1=&#8221;oui&#8221; option2=&#8221;ip&#8221; option3=&#8221;nic&#8221; option4=&#8221;mca&#8221; correct=&#8221;option1&#8243;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/exam.pscnotes.com\/mcq\/on-wireless-networks-filtering-is-the-security-measure\/\" \/>\n<meta property=\"og:site_name\" content=\"MCQ and Quiz for Exams\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-16T01:33:07+00:00\" \/>\n<meta name=\"author\" content=\"rawan239\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"rawan239\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"On wireless networks . . . . . . . . filtering is the security measure.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/exam.pscnotes.com\/mcq\/on-wireless-networks-filtering-is-the-security-measure\/","og_locale":"en_US","og_type":"article","og_title":"On wireless networks . . . . . . . . filtering is the security measure.","og_description":"[amp_mcq option1=&#8221;oui&#8221; option2=&#8221;ip&#8221; option3=&#8221;nic&#8221; option4=&#8221;mca&#8221; correct=&#8221;option1&#8243;]","og_url":"https:\/\/exam.pscnotes.com\/mcq\/on-wireless-networks-filtering-is-the-security-measure\/","og_site_name":"MCQ and Quiz for Exams","article_published_time":"2024-04-16T01:33:07+00:00","author":"rawan239","twitter_card":"summary_large_image","twitter_misc":{"Written by":"rawan239","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/exam.pscnotes.com\/mcq\/on-wireless-networks-filtering-is-the-security-measure\/","url":"https:\/\/exam.pscnotes.com\/mcq\/on-wireless-networks-filtering-is-the-security-measure\/","name":"On wireless networks . . . . . . . . filtering is the security measure.","isPartOf":{"@id":"https:\/\/exam.pscnotes.com\/mcq\/#website"},"datePublished":"2024-04-16T01:33:07+00:00","dateModified":"2024-04-16T01:33:07+00:00","author":{"@id":"https:\/\/exam.pscnotes.com\/mcq\/#\/schema\/person\/5807dafeb27d2ec82344d6cbd6c3d209"},"breadcrumb":{"@id":"https:\/\/exam.pscnotes.com\/mcq\/on-wireless-networks-filtering-is-the-security-measure\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/exam.pscnotes.com\/mcq\/on-wireless-networks-filtering-is-the-security-measure\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/exam.pscnotes.com\/mcq\/on-wireless-networks-filtering-is-the-security-measure\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/exam.pscnotes.com\/mcq\/"},{"@type":"ListItem","position":2,"name":"mcq","item":"https:\/\/exam.pscnotes.com\/mcq\/category\/mcq\/"},{"@type":"ListItem","position":3,"name":"Internet of things (iot)","item":"https:\/\/exam.pscnotes.com\/mcq\/category\/mcq\/internet-of-things-iot\/"},{"@type":"ListItem","position":4,"name":"On wireless networks . . . . . . . . filtering is the security measure."}]},{"@type":"WebSite","@id":"https:\/\/exam.pscnotes.com\/mcq\/#website","url":"https:\/\/exam.pscnotes.com\/mcq\/","name":"MCQ and Quiz for Exams","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/exam.pscnotes.com\/mcq\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/exam.pscnotes.com\/mcq\/#\/schema\/person\/5807dafeb27d2ec82344d6cbd6c3d209","name":"rawan239","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/exam.pscnotes.com\/mcq\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/761a7274f9cce048fa5b921221e7934820d74514df93ef195a9d22af0c1c9001?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/761a7274f9cce048fa5b921221e7934820d74514df93ef195a9d22af0c1c9001?s=96&d=mm&r=g","caption":"rawan239"},"sameAs":["https:\/\/exam.pscnotes.com"],"url":"https:\/\/exam.pscnotes.com\/mcq\/author\/rawan239\/"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/exam.pscnotes.com\/mcq\/wp-json\/wp\/v2\/posts\/59209","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/exam.pscnotes.com\/mcq\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/exam.pscnotes.com\/mcq\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/exam.pscnotes.com\/mcq\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/exam.pscnotes.com\/mcq\/wp-json\/wp\/v2\/comments?post=59209"}],"version-history":[{"count":0,"href":"https:\/\/exam.pscnotes.com\/mcq\/wp-json\/wp\/v2\/posts\/59209\/revisions"}],"wp:attachment":[{"href":"https:\/\/exam.pscnotes.com\/mcq\/wp-json\/wp\/v2\/media?parent=59209"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/exam.pscnotes.com\/mcq\/wp-json\/wp\/v2\/categories?post=59209"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/exam.pscnotes.com\/mcq\/wp-json\/wp\/v2\/tags?post=59209"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}