A security administrator is responsible for ensuring that there are no unauthorized devices utilizing the corporate network. During a routine scan, the security administrator discovers an unauthorized device belonging to a user in the marketing department. The user is using an android phone in order to browse websites. Which of the following device attributes was used to determine that the device was unauthorized?

A. An IMEI address
B. A phone number
C. A MAC address
D. An asset ID


Answer: C. A MAC address

Computer Science & Information Technology

You might also like to view...

The Sound Byte uses the term all-in-one system to describe a type of ________ computer

A) laptop B) netbook C) desktop D) ultrabook

Computer Science & Information Technology

Files deleted from a flash drive are sent to the Recycle Bin and could be recovered, if necessary

Indicate whether the statement is true or false

Computer Science & Information Technology

The Total row of a table is a record

Indicate whether the statement is true or false

Computer Science & Information Technology

Which method returns a collection of references to all instances of a certain element in an HTML document??

A. ?getElementById() B. ?getElementsByName() C. ?getElementsByTagName() D. ?getElementsByClassName()

Computer Science & Information Technology