The simple answer
A MAC address (Media Access Control address) is a unique identifier assigned to a network interface card (NIC) at the time it's manufactured. It's permanently embedded in the hardware — every Wi-Fi card, Ethernet adapter, and Bluetooth chip has one, and no two are supposed to be the same anywhere in the world.
If an IP address is like your current home address (it can change when you move), a MAC address is like your fingerprint — it stays with the hardware forever regardless of where it connects.
What a MAC address looks like
A MAC address is 48 bits long, written as six pairs of hexadecimal characters separated by colons or hyphens. It always looks something like this:
Hexadecimal uses digits 0–9 and letters A–F, so each pair can represent values from 00 to FF. You don't need to memorize the math — just recognize the format on the exam.
MAC addresses appear on the exam written with colons (A4:C3:F0:7B:2D:91) or hyphens (A4-C3-F0-7B-2D-91). Both are the same address — Windows tends to use hyphens, Linux and Mac use colons. Either format is valid.
The exam may also call the first half the OUI (Organizationally Unique Identifier) — this identifies the manufacturer and is worth knowing by name.
MAC address vs IP address — the key difference
This is one of the most commonly tested comparisons on the A+ exam. The short version: a MAC address is a permanent hardware identity, while an IP address is a temporary logical assignment. They operate at different layers of the OSI model and serve different purposes.
| MAC Address | IP Address | |
|---|---|---|
| What it is | Hardware address | Logical address |
| Assigned by | Manufacturer (burned in) | DHCP server or manually |
| Can it change? | No (permanent)* | Yes — changes per network |
| OSI Layer | Layer 2 — Data Link | Layer 3 — Network |
| Format | A4:C3:F0:7B:2D:91 | 192.168.1.25 |
| Scope | Local network only | Global (internet-routable) |
| Used by | Switches, ARP | Routers, DNS, internet |
* MAC addresses can be spoofed in software, but the physical address burned into the hardware doesn't change.
How to find your MAC address on Windows
The fastest way is with ipconfig /all — the same command from the network troubleshooting commands guide. Look for the line labeled Physical Address.
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : Intel(R) Ethernet Connection
Physical Address. . . . . . . . . : A4-C3-F0-7B-2D-91
DHCP Enabled. . . . . . . . . . . : Yes
IPv4 Address. . . . . . . . . . . : 192.168.1.25
Subnet Mask . . . . . . . . . . . : 255.255.255.0
Default Gateway . . . . . . . . . : 192.168.1.1
The Physical Address line is your MAC address. Windows displays it with hyphens. Notice it appears right alongside the IP address — both are shown by ipconfig /all but serve completely different purposes.
How switches use MAC addresses
This is where MAC addresses do their most important work. A switch operates at Layer 2 of the OSI model and uses MAC addresses — not IP addresses — to decide where to send frames on a local network.
This is why switches are more efficient than hubs — a hub blindly sends every frame to every device, while a switch uses MAC addresses to deliver frames only where they need to go.
ARP — how IP addresses get matched to MAC addresses
Here's a question worth thinking about: if switches use MAC addresses and routers use IP addresses, how does a device know the MAC address of another device it wants to talk to?
The answer is ARP — Address Resolution Protocol. When Device A wants to send data to 192.168.1.30 but doesn't know its MAC address, it broadcasts an ARP request to the whole network: "Who has 192.168.1.30? Tell me your MAC address."
ARP Request (broadcast): "Who has 192.168.1.30? Tell A4:C3:F0:7B:2D:91."
ARP Reply (unicast): "192.168.1.30 is at B8:27:EB:4A:1C:55."
Device A stores this mapping in its ARP cache so it doesn't have to ask again. You can view your ARP cache by running arp -a in a Windows command prompt.
What the A+ exam tests on MAC addresses
DHCP servers can be configured to always assign the same IP address to a specific device by matching its MAC address. This is called a DHCP reservation (or static DHCP assignment). The server says: "Whenever I see MAC address A4:C3:F0:7B:2D:91, always give it 192.168.1.50."
This is how network printers and servers get consistent IP addresses without being manually configured with a static IP. It comes up on both A+ and Network+ exams.
MAC spoofing — the Security+ attack
Although MAC addresses are burned into hardware, the operating system can override what it transmits — this is called MAC spoofing. An attacker changes their device's reported MAC address to impersonate another device on the network.
Bypass MAC filtering: Many wireless networks use MAC address filtering as an access control measure — only allowing known MAC addresses to connect. An attacker can capture a legitimate device's MAC address from wireless traffic (MACs are transmitted in plaintext) and spoof it to gain access.
Identity impersonation: On wired networks, spoofing a MAC address can fool switches into forwarding traffic intended for the real device to the attacker instead — a form of Layer 2 interception.
MAC filtering is easily defeated by spoofing and should never be relied on as a primary security control. The Security+ exam expects you to recognise it as security through obscurity — it adds friction but provides no real protection against a determined attacker. Use 802.1X (RADIUS authentication) instead for genuine network access control.
CAM table overflow attack
Switches maintain a CAM table (Content Addressable Memory) — a mapping of MAC addresses to switch ports. This is how a switch knows which port to send traffic to, rather than flooding it everywhere like a hub. Each entry has a timeout and is refreshed when traffic is seen from that MAC address.
A CAM table overflow attack exploits the fact that the CAM table has finite memory. The attacker floods the switch with thousands of frames with fake source MAC addresses, filling the CAM table completely. When the table is full, the switch can no longer learn new entries — it falls back to flooding all traffic out of all ports, exactly like a hub. The attacker's device, connected to one of those ports, now receives a copy of every frame on the network.
Port security — the defence
Port security is a switch feature that limits how many MAC addresses can be learned on a given port, and optionally locks the port to specific MAC addresses. It directly counters CAM table overflow attacks and prevents rogue devices from connecting.
MAC spoofing — attacker changes their MAC to impersonate another device. Bypasses MAC filtering. Defence: use 802.1X instead of MAC filtering.
CAM table overflow — floods switch with fake MACs until it floods traffic like a hub. Enables passive interception. Defence: port security with maximum MAC limit per port.
Port security shutdown mode — the most restrictive violation response. Err-disables the port immediately when a violation is detected.
Broadcast vs unicast vs multicast — MAC addressing modes
Not all frames are addressed to a single device. Understanding the three MAC addressing modes is tested on both A+ and Network+:
| Type | MAC address | Delivered to | Example use |
|---|---|---|---|
| Unicast | Specific device MAC | One device only | Normal data transfer between two devices |
| Broadcast | FF:FF:FF:FF:FF:FF | All devices on segment | ARP requests, DHCP discovery |
| Multicast | Starts with 01:00:5E (IPv4) | Group of subscribed devices | Video streaming, routing protocol updates |
Key Takeaways
arp -aipconfig /all — look for Physical AddressRelated Articles
Preparing for the A+ exam?
See the books and practice exams that make the most difference.