Which of these is a vulnerability of MAC address filtering?

a. APs use IP addresses instead of MACs.
b. The user must enter the MAC.
c. MAC addresses are initially exchanged unencrypted.
d. Not all operating systems support MACs.

Q&A Education