Crispy6490 Crispy6490 02-05-2024 Computers and Technology contestada Which of these is a vulnerability of MAC address filtering?a. APs use IP addresses instead of MACs.b. The user must enter the MAC.c. MAC addresses are initially exchanged unencrypted.d. Not all operating systems support MACs.