For access points that employ MAC filtering, an attacker will attempt to use MAC spoofing to bypass this feature. MAC filtering is usually implemented...